AI-driven threats are redefining digital security, but verified trust, continuous authentication and biometric technology can ...
For more than a decade, I have been advocating for more use of multifactor authentication (MFA). Far too many online transactions still occur using simple passwords that are often reused, copied, ...
Biometric authentication technology can secure access to what’s important to us online, such as our data, finances and key digital services. It can afford us effortless access while keeping fraudsters ...
Discover why common misconceptions hold back passwordless authentication—and how it can transform your security.
In today’s world, with smartphones unlocked with fingerprints and even a cheap camera highlighting friends and family in snapshots, it may feel like a surprise that passwords are still the most ...
"AI is a sword, and everyone's using it as a sword. But what happens when it's used as a sword against you? You have to be able to defend against it." Video Authentication for the AI Age: Swear, a ...
Apple’s product release events are famous for providing the stage where innovative products and services are introduced to the world for the first time. From Steve Jobs pulling the iPod out of his ...
New technology that confirms the validity of a traveler’s identification (ID) as well as their flight information in real time is now in use at the Transportation Security Administration (TSA) ...
No one likes passwords, whether workers or cybersecurity leaders. Now, more companies are doing away with them and say other leading alternatives, such as multi-factor authentication, are also showing ...
A credential authentication technology (CAT) unit has been installed and is in use at the Transportation Security Administration checkpoint at Capital Region International Airport (LAN). “The new ...
It seems like every week we are faced with news of another critical data breach at a major service provider or retailer. The number and scope of these breaches is shocking. New reports say it is ...
The Federal Communications Commission today said it closed a robocall loophole by requiring small phone companies to implement the caller ID authentication technology known as STIR and SHAKEN. Large ...