• Is the federal government able to comply with our requirements for strong authentication, file encryption, vulnerability and patch management, and privileged user controls?

    FORBES: An Open Letter to Senator Rockefeller

  • PhoneFactor is one company that is gaining traction with two factor (strong) authentication based on mobile devices.

    FORBES: Perhaps Sony should consider strong authentication?

  • Those innocuous traits led investigators to initially believe the computer access from China using Bob's credentials was unauthorized -- and that some form of malware was sidestepping strong two-factor authentication that included a token RSA key fob under Bob's name.

    CNN: STORY HIGHLIGHTS

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定