News

The Initiative for Open Authentication (OATH) is developing technology to enable strong authentication of all users on all devices, across all networks, such as its algorithm for one-time passwords.
* Allows the sharing of device credentials, strong authentication algorithms, and authentication client software across many network end-points (desktop computers, servers, switches, Wi-Fi access ...
According to new research, more companies are enabling biometric authentication on devices to verify access requests.
Breaking a SHA-1-generated SSH authentication key now costs roughly $50,000, putting high-profile remote servers at risk of attacks.
Cisco Systems Inc. said today that it’s expanding its Secure Access Service Edge portfolio to help network operations and security operations teams connect users to the applications they work ...
Google announces new algorithm that makes FIDO encryption safe from quantum computers New approach combines ECDSA with post-quantum algorithm called Dilithium.
Suprema, a pioneer in AI-powered access control and security solutions, announced that its AI-based facial authentication access control devices have obtained CE RED certification under the European ...