An ancient network authentication protocol has received its first death notice. The protocol, which has roots going back to the first local area network days of the 1980s, is called Microsoft NTLM, ...
Viettel plans to commercialize network authentication across financial services, e-government, fintech, and mobile ...
In the NAC products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very early what kind of ...
A team of security researchers has discovered a significant vulnerability in the widely used RADIUS (Remote Authentication Dial-In User Service) protocol. This vulnerability could potentially allow ...
Regular readers will know that I’m a big fan of context-based access. I like the idea of gathering as much context information as possible and using it for authentication and authorization as well as ...
Telkom Indonesia’s intermational arm Telin announed on Thursday it is partnering with IPification to commercialize its Mobile ...
The most common way cyber-criminal hackers break into enterprise networks is by stealing or guessing usernames and passwords. The attacks, whether the goal is stealing information, executing a ...
Learn how IP lookup, reputation checks, VPN detection, and risk-based MFA strengthen enterprise authentication and prevent fraud.
Blockchain firm Lightning Labs drafted the specifications of a new Lightning Network-based authentication system that could replace traditional email-based accounts. According to a March 30 ...
Optiv Canada has been awarded the first major enterprise contract under Shared Services Canada’s (SSC) cybersecurity procurement vehicle (CSPV) for its network device authentication (NDA) solution, ...
The project aims to build a small, efficient, and scalable biometric authentication system that can be used for securing doorways all through a complex. The project aims to build a small, efficient, ...
The building where I work is blanketed by a shared wireless network that requires authentication through some Cisco system before you can access anything (but after you connect to it -- it's ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results