Posted on 19 December 2013 by Thales DIS
Bring-Your-Own-Identity (BYOI) represents an evolution in authentication schemes by offering a better user experience and security than the use of multiple passwords for different services.
Posted on 01 April 2014 by Thales DIS
Find out the three steps that every company should take to mitigate the overall cost and adverse consequences that result from a security breach.
Posted on 01 May 2014 by Danna Bethlehem
Two-factor authentication can prevent unauthorized access and credential leakage by ensuring that only a validated user is given system access.
Posted on 04 August 2014 by Thales DIS
Learn the best way to control access and the authentication of users in the sixth and final part of our Securing the Breach blog series.
Posted on 21 October 2014 by Thales DIS
IoT-enabled mobile banking makes it’s easier than ever to perform financial transactions… and, as this IoT Nightmare shows, lose your nest egg.
Posted on 16 December 2014 by Thales DIS
This post originally appeared on SafeNet’s The Art of Data Protection blog prior to SafeNet being acquired by Gemalto. Nippon RA created a solution enabling cloud providers to secure access to cloud-based applications and assets using integrated PKI authentication. By installing digital certificates on users’ devices, Nippon RA is able to verify a user’s identity […]