Ten tips for user password security
03 February, 2014 by David Attard*We keep on hearing of more and more password leaks, hacks, identities being stolen and loss of personal information. Help your users generate better passwords - and look after them better - with these tips.
Google's "privatised surveillance" breaks Dutch law
05 December, 2013 by Dylan Bushell-EmblingDutch regulators have declared Google's practice of aggregating user data to be a breach of local law, in a case which could have wider implications for the firm in the EU and elsewhere.
Management of security risk in information technology
12 November, 2013The white paper addresses the Monetary Authority of Singapore (MAS) internet banking and technology risk management guidelines.
A password you can swallow? Don’t hold your breath
28 June, 2013 by James H Hamlyn-Harris, Swinburne University of TechnologyIf you believe the hype, a ‘password pill’ could save you from remembering passwords. But don’t hold your breath for this technology - better alternatives are already available.
Verizon enhancing Enterprise Identity Services
23 September, 2011 byVerizon is enhancing its cloud-based Enterprise Identity Services to offer more ways to authenticate users to corporate networks.
RSA Token one-to-one swap offer for CA ArcotID Secure Software Credential
07 April, 2011 byFollowing a hacking attack on RSA Security, which may have compromised the integrity of RSA’s SecureID two-factor authentication tokens, CA Technologies is offering all RSA SecurID token customers an opportunity to trade their RSA tokens for CA ArcotID secure software credentials in a one-for-one swap.
Social media demands a review of your security framework
28 July, 2010 by Rob Forsyth*The time lapse between the beginning of publicly available internet and what we now refer to as Web 2.0 was short. A relative nanosecond in terms of history. Rob Forsyth jumps forward from the history of the internet to social media and advocates that organisations need to embrace security to enable as much access to technologies as possible under a robust security framework.
Directory management
22 April, 2009 byAccess Manager 3.1 offers built-in support for WS-federation, a single sign-on feature.
Vein ID technology coming to an Aussie ATM near you
28 January, 2009Finger vein authentication technology, developed by Hitachi following several years of R&D, uses the vein patterns of one's fingers to verify individual identity.