Strong authentication remains a cybersecurity priority under the Office of Management and Budget’s (OMB) cross-agency priority goals that were announced in the 2015 federal budget. In its 2015 budget ...
BEDFORD, Mass., March 15 /PRNewswire-FirstCall/ – RSA Security Inc. (Nasdaq: RSAS) today announced that Post & Schell, a Philadelphia-based law firm serving clients ...
PRINCETON JUNCTION, N.J., May 2, 2016 – Today, the FIDO Alliance is working to provide simpler, stronger authentication to reduce reliance on usernames and passwords, which are susceptible to a wide ...
DataLocker Sentry 5 hardware-encrypted USB flash drive in use, featuring FIPS 140-3 Level 3 validation and smart card–based authentication to protect sensitive data in mission-critical environments.
Brex reports that smart cards, used in various sectors, feature embedded chips for secure transactions and spend management, ...
When creating an access control system, it is important to remember that there is no single, correct solution — there are combinations of solutions. However, when it comes to security, there is no ...
Princeton Junction, N.J., March 3, 2011-The requirement for strong, multi-factor authentication needs to be incorporated into Stage 2 of Meaningful Use in order to adequately protect identities, ...
Virtually every day another news story highlights the importance of network security – corporate networks are breached, databases are accessed by unauthorized individuals, and identities are stolen ...
The Smart Card Alliance Healthcare Council is urging the use of two-factor authentication with smart card technology as a way to protect against medical identity theft. According to a recent Ponemon ...
There are now billions of EMV-enabled cards in the world, but they are not foolproof and can be made more secure through new authentication technologies. In most retailers today, customers don’t swipe ...
In parallel, DataLocker introduced native smart card authentication for the Sentry 5, enabling support for Common Access Cards (CAC) and Personal Identity Verification (PIV) credentials—the ...
Princeton Junction, NJ, December 16, 2010 – "With everything we know today about identity theft, data breaches, malware and fraud, how can anyone responsibly advocate password-only security for ...