PhoneFactor (News - Alert), a provider of out-of-band multi-factor authentication, announced a new partnership with Accelera Solutions to make PhoneFactor available to government agencies through the ...
CACI International CACI recently announced that it has signed a partnership with the Palo Alto, CA-based network & security company, Yubico, through a memorandum of understanding. Per the deal, Yubico ...
Advanced multi-factor authentication solutions provide fraud protection by using verification techniques like hardware OTP authentication, smart card-based authentication, phone-based authentication, ...
Editor’s note: This story has been updated to include additional information about the Open-Architecture Data Repository and NOAA’s supercomputing improvements. The National Oceanic and Atmospheric ...
PALO ALTO, Calif. (May 23, 2017) – Vera (vera.com), the leader in data-centric security enabling businesses to secure, track and share any type of digital information, today announced support for ...
Chances are your organization uses cloud applications like Microsoft Office 365, Salesforce and Workday every day. And chances are also that the cloud applications you count on are primarily ...
BOSTON & TEL AVIV, Israel--(BUSINESS WIRE)--Silverfort, the provider of next-generation multi-factor authentication solutions, today announced a first-of-its-kind AI-based risk engine that analyzes ...
As criminals’ knowledge of how to beat multi-factor authentication through phishing schemes increases, the need for payment providers to implement phishing-resistant solutions continues to grow.
The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Government’s Cooperative Research Centres Programme. The work has been ...
Remember the good old days, when the only people who needed access to your virtual private network (VPN) were full-time, on-site employees using company-issued devices? Today, the people who need VPN ...
Princeton Junction, N.J., March 3, 2011-The requirement for strong, multi-factor authentication needs to be incorporated into Stage 2 of Meaningful Use in order to adequately protect identities, ...