Tuesday, June 7, 2016

Buyer’s Guide to 9 multi-factor authentication products

Widespread exploits evade protections enforced by Microsoft EMET

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jun 07, 2016
Featured Image

Buyer's Guide to 9 multi-factor authentication products

The two-factor authentication market has moved toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Widespread exploits evade protections enforced by Microsoft EMET
9-vendor authentication roundup: The good, the bad and the ugly
8 reasons why your security awareness program sucks
5 trends shaking up multi-factor authentication
Why legal departments begrudge the cloud
10 security Ted Talks you can't miss
Researchers wirelessly hack Mitsubishi Outlander Hybrid SUV, turn off anti-theft alarm
Ping Identity invests in blockchain vendor to create new identity standard

White Paper: CA Technologies

Addressing PCI Compliance Through Privileged Access Management

Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. Read More

Thumbnail Image

Widespread exploits evade protections enforced by Microsoft EMET

Hackers have launched large-scale attacks that are capable of bypassing the security protections added by Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a tool whose goal is to stop software exploits. Read More

Thumbnail Image

9-vendor authentication roundup: The good, the bad and the ugly

New 'smart' tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift. Read More

Thumbnail Image
INSIDER

8 reasons why your security awareness program sucks

I have come to the conclusion that most awareness programs are just very bad, and that like all security countermeasures, there will be an inevitable failing. Read More

Thumbnail Image
INSIDER

5 trends shaking up multi-factor authentication

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage, would make hardware tokens extinct. Read More

Thumbnail Image

Why legal departments begrudge the cloud

Legal professionals are by their nature a skeptical and cautious lot, but the sharp rise in cloud-based applications being used by enterprises and law firms, as well as recent high-profile law firm security breaches, has many legal professionals reticent about entering cloud engagements. Read More

Thumbnail Image

10 security Ted Talks you can't miss

A slideshow of 10 interesting TED talks Read More

Thumbnail Image

Researchers wirelessly hack Mitsubishi Outlander Hybrid SUV, turn off anti-theft alarm

Security researchers discovered several vulnerabilities in the Mitsubishi Outlander Hybrid SUV, including being able to disable the anti-theft alarm from a laptop. Read More

Thumbnail Image

Ping Identity invests in blockchain vendor to create new identity standard

Ping Identity invests in blockchain vendor Swrlds to create new standard for distributed session management, remove blockchain limitations. Read More

White Paper: CA Technologies

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 more pointless (but awesome) Linux terminal tricks

40 years of Apple: Apple's most innovative products Read More

Most-Read Stories

1. Credibility and trust: Microsoft blows it
2. Father's Day 2016 gift ideas for the discerning geek techie
3. Groundbreaking jury verdict finds Utah firms made 117 million illegal telemarketing calls
4. Top Raspberry Pi news of the week: Magic mirror; Micro:Bit gets real; more on Android
5. 19 free cloud storage options
6. Watching Steve Jobs stare slack-jawed at Muhammad Ali
7. Bloodiest tech industry layoffs of 2016 so far
8. Review: The Dell XPS 13 Developer Edition laptop is nearly perfect
9. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
10. OpenSwitch finds critical home at Linux Foundation
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive