Axalto last week offered up a smart card based on Microsoft’s .Net technology, which could make it easier for corporations adopting .Net for Web services to develop card-based security. Axalto last ...
Smart cards can also include additional strong authentication capabilities such as or Public Key Infrastructure (“PKI”) certificates. When used for PKI applications, the smart card device can provide ...
Many companies react to APT (advanced persistent threat) attacks by implementing smart cards and/or other two-factor authentication mechanisms. Unfortunately, these schemes do nothing to stop APT. In ...
AUSTIN, Texas--(BUSINESS WIRE)--HID Global ®, a worldwide leader in trusted identity solutions, today announced it has added FIDO2 authentication to its Crescendo smart cards, enabling them to support ...
If you are serious about computer/network security, then you must have a solid understanding of authentication methods. Debra Littlejohn Shinder takes a moment to lay out the role authentication plays ...
A variant of the Sykipot Trojan Horse hijacks U.S. Department of Defense (DoD) smart cards in order to access restricted resources. “We recently discovered a variant of Sykipot with some new, ...
As data breaches persist across organizations in just about every vertical market, security systems integrators should be looking at cybersecurity as the next big frontier. Whether you already have a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results