VeriSign introduced its latest package of authentication tools on Tuesday and said it will deliver a version of the product designed specifically for Microsoft's Windows later this year. The package ...
Risk-based authentication (RBA), also called adaptive authentication, has come of age, and it couldn’t happen fast enough for many corporate security managers. As phishing and account takeovers have ...
Funding for cybersecurity startups continues to look bleak. According to a recent Crunchbase survey, companies in the digital security space raised 30% less funds — $1.9 billion — in Q3 2023 compared ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More According to an industry survey conducted by biometric authentication ...
Learn how IP lookup, reputation checks, VPN detection, and risk-based MFA strengthen enterprise authentication and prevent fraud.
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Compromised passwords are responsible for some 80% of all data breaches, ...
ATLANTA--(BUSINESS WIRE)--Pindrop, a global leader in voice technology, announced its latest deployment of product features at RSA Conference 2022 — advancing voice security even further by allowing ...
Y Combinator-backed Ethiopia’s Better Auth has raised $5 million in seed funding to build a dev-friendly authentication tool. The funding round was led by Peak XV (formerly Sequoia India and Southeast ...
The Liberty Alliance Project, a consortium of companies that’s working on federated identity management standards, last week announced the creation of a group that will focus on developing ...
Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication Your email has been sent If you use VMware Tools for Windows, it is ...
The Federal Communications Commission today said it closed a robocall loophole by requiring small phone companies to implement the caller ID authentication technology known as STIR and SHAKEN. Large ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results