article thumbnail

Alternatives to facial recognition authentication

Tech Republic Security

Learn the problem with facial recognition as well as software and hardware alternatives to the technology. The post Alternatives to facial recognition authentication appeared first on TechRepublic.

article thumbnail

Microsoft Improves Windows Security with a Path to Move Off NTLM

Tech Republic Data Center

It’s time to stop relying on the insecure authentication protocol built into Windows. Microsoft is making it easier to switch to secure modern options.

Windows 178
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to move Google Authenticator from one iPhone or Android device to another

Tech Republic Security

If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.

article thumbnail

Fortinet tightens integration of enterprise security, networking controls

Network World

Fortinet has made available a new release of its core FortiOS software that includes features the vendor says will help enterprises more tightly meld security and networking controls. FortiOS is the vendor’s operating system for the FortiGate family of hardware and virtual components. FortiOS 7.2, How to choose an edge gateway.

Network 151
article thumbnail

Passkeys: Using FIDO for Secure and Easy Authentication

Phil Windley

Summary: Passkeys, the popular name for FIDO, are not only easy, they offer better protection against phishing than other forms of multi-factor authentication. She's a security expert and focused many of her remarks on the relative security of different multi-factor authentication (MFA) techniques, a topic I cover in my book as well.

article thumbnail

Google Authenticator: How to move from one iPhone or Android device to another

Tech Republic Security

If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.

article thumbnail

10 essential tips for bolstering cloud security in your business

CIO Business Intelligence

This makes it more critical than ever to adopt strong security measures to protect sensitive information and infrastructure. However, while cloud computing offers benefits like improved efficiency, scalability, and accessibility, it poses new security challenges.

Security 132