If Grayshift and Cellebrite can hack your iPhone, so can hackers. Will your PINs hold up? Make sure they're strong.
Passwords are lame, so you should come to grips with 2FA, U2F, OAuth, etc.
Do your employees have kids or siblings? Why Apple's Face ID fail spells trouble for enterprise IT adoption.
Apple's new Face ID is a big step forward, but it's still no match for multifactor security.
Never underestimate the echo-chamber’s ability to find hilarious privacy scares—and security woes—in any new tech.
State of 2FA takeaway: Beware the socially-engineered weak link in the chain.
Is OAuth 2.0 too risky for your organization? Here's a detailed look at the issues you need to understand to decide on authentication protocols.
Passwords may not offer the most secure form of authentication but there are several measures developers can take to make them more robust and...
Security experts now recommend against using one-time SMS text messages for two-factor authentication, but you needn't rush to replace it. Here's why.
Of the three approaches to identity and access management for microservices-based apps, only one balances the need for security against application...