In this podcast recorded at RSA Conference 2015, Dave Rockvam, Vice President of Product Management at Entrust Datacard, talks about how employees and other authorized users want convenient access to facilities, networks and apps.
All organizations require the means to authenticate the identities of users, machines or mobile devices for access to sensitive networks, services, applications or facilities.
A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully used to authenticate users to their mobile phones.
Google developers have created Password Alert, an open source Chrome extension that aims to prevent users from entering their Google password in a phishing site or, alternatively, alert them when they did so and urge them to change their password.
As users are instructed to create ever more complex passwords, and developers are starting to use encryption methods more difficult to crack than standard hashing functions, password crackers (and penetration testers) must wisely choose which type of password attack to try first, second, and so on.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.