<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Authentication</title> <atom:link href="https://www.iphere.com/tag/authentication/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>How the FIDO Alliance&#8217;s U2F could simplify two-factor authentication</title><link>https://www.iphere.com/how-the-fido-alliances-u2f-could-simplify-two-factor-authentication</link> <comments>https://www.iphere.com/how-the-fido-alliances-u2f-could-simplify-two-factor-authentication#comments</comments> <pubDate>Tue, 21 Oct 2014 20:13:29 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA['Simplify']]></category> <category><![CDATA[Alliance's]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[Could]]></category> <category><![CDATA[FIDO]]></category> <category><![CDATA[twofactor]]></category> <guid
isPermaLink="false">http://www.iphere.com/how-the-fido-alliances-u2f-could-simplify-two-factor-authentication</guid> <description><![CDATA[We&#8217;ve had enough malware campaigns and data breaches to confirm the need for better data protection online. The Universal 2nd Factor (U2F) standard is a step in the right direction, and the first compatible devices are coming out now. U2F is an open authentication standard. It was initially developed by Google, but it&#8217;s now managed [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/how-the-fido-alliances-u2f-could-simplify-two-factor-authentication/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>3 simple ways two-factor authentication can protect you when no one else will</title><link>https://www.iphere.com/3-simple-ways-two-factor-authentication-can-protect-you-when-no-one-else-will</link> <comments>https://www.iphere.com/3-simple-ways-two-factor-authentication-can-protect-you-when-no-one-else-will#comments</comments> <pubDate>Tue, 14 Oct 2014 14:14:56 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[Else]]></category> <category><![CDATA[Protect]]></category> <category><![CDATA[Simple]]></category> <category><![CDATA[twofactor]]></category> <category><![CDATA[Ways]]></category> <guid
isPermaLink="false">http://www.iphere.com/3-simple-ways-two-factor-authentication-can-protect-you-when-no-one-else-will</guid> <description><![CDATA[It seems like consumer data is compromised in some massive data breach every other week. You should expect the companies you do business with to do everything possible to prevent data breaches and protect your data, but it’s unreasonable to believe it will never happen. It’s up to you to take additional steps to protect [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/3-simple-ways-two-factor-authentication-can-protect-you-when-no-one-else-will/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Hack of iPhone 5s fingerprint authentication is irrelevant</title><link>https://www.iphere.com/hack-of-iphone-5s-fingerprint-authentication-is-irrelevant</link> <comments>https://www.iphere.com/hack-of-iphone-5s-fingerprint-authentication-is-irrelevant#comments</comments> <pubDate>Tue, 24 Sep 2013 20:14:26 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[fingerprint]]></category> <category><![CDATA[Hack]]></category> <category><![CDATA[iPhone]]></category> <category><![CDATA[irrelevant]]></category> <guid
isPermaLink="false">http://www.iphere.com/hack-of-iphone-5s-fingerprint-authentication-is-irrelevant</guid> <description><![CDATA[The iPhone 5s officially launched last Friday, but already a group of hackers has successfully cracked the fingerprint authentication. In spite of the hype surrounding this news, though, the hack of Touch ID idoesn’t change the fact that the fingerprint sensor on the iPhone 5s is the best thing that’s happened to iPhone security so [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/hack-of-iphone-5s-fingerprint-authentication-is-irrelevant/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Postal Service Pilots Next-Gen Authentication Tech</title><link>https://www.iphere.com/postal-service-pilots-next-gen-authentication-tech</link> <comments>https://www.iphere.com/postal-service-pilots-next-gen-authentication-tech#comments</comments> <pubDate>Sat, 05 Jan 2013 08:12:55 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[NextGen]]></category> <category><![CDATA[Pilots]]></category> <category><![CDATA[Postal]]></category> <category><![CDATA[Service]]></category> <category><![CDATA[Tech]]></category> <guid
isPermaLink="false">http://www.iphere.com/postal-service-pilots-next-gen-authentication-tech</guid> <description><![CDATA[The U.S. Postal Service will be the guinea pig for a White House-led effort to accelerate government adoption of technologies that allow federal agencies to accept third-party identity credentials for online services. The program involves using services from organizations like PayPal and Google through standards like OpenID rather than requiring users to create government user [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/postal-service-pilots-next-gen-authentication-tech/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Mobile Biometrics: The Next Phase of Enterprise Authentication?</title><link>https://www.iphere.com/mobile-biometrics-the-next-phase-of-enterprise-authentication</link> <comments>https://www.iphere.com/mobile-biometrics-the-next-phase-of-enterprise-authentication#comments</comments> <pubDate>Wed, 12 Dec 2012 08:14:22 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[Biometrics]]></category> <category><![CDATA[Enterprise]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Next]]></category> <category><![CDATA[Phase]]></category> <guid
isPermaLink="false">http://www.iphere.com/mobile-biometrics-the-next-phase-of-enterprise-authentication</guid> <description><![CDATA[Smartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise&#8212;if we can get the hardware, software and business processes right. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/mobile-biometrics-the-next-phase-of-enterprise-authentication/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>BGP Origin Authentication and RPKI</title><link>https://www.iphere.com/bgp-origin-authentication-and-rpki</link> <comments>https://www.iphere.com/bgp-origin-authentication-and-rpki#comments</comments> <pubDate>Sat, 16 Jun 2012 20:30:11 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[Origin]]></category> <category><![CDATA[RPKI]]></category> <guid
isPermaLink="false">http://www.iphere.com/bgp-origin-authentication-and-rpki</guid> <description><![CDATA[The BGP Origin Authentication is a positive step, writes our blogger, but it has a downside. Learn more about IP address theft. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/bgp-origin-authentication-and-rpki/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>WWPass: Only The Just May Pass the Authentication Test</title><link>https://www.iphere.com/wwpass-only-the-just-may-pass-the-authentication-test</link> <comments>https://www.iphere.com/wwpass-only-the-just-may-pass-the-authentication-test#comments</comments> <pubDate>Fri, 23 Mar 2012 02:13:59 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[Just]]></category> <category><![CDATA[Only]]></category> <category><![CDATA[Pass]]></category> <category><![CDATA[Test]]></category> <category><![CDATA[WWPass]]></category> <guid
isPermaLink="false">http://www.iphere.com/wwpass-only-the-just-may-pass-the-authentication-test</guid> <description><![CDATA[Security has many facets, but the one that is most familiar is the username/password authentication process that allows users to login to a protected application or Website. For some, that may simply seem to be an inconvenience, but the authentication process helps reduce possible security exposures. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/wwpass-only-the-just-may-pass-the-authentication-test/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>EAPeak Tests Wireless Networks For Authentication Weaknesses</title><link>https://www.iphere.com/eapeak-tests-wireless-networks-for-authentication-weaknesses</link> <comments>https://www.iphere.com/eapeak-tests-wireless-networks-for-authentication-weaknesses#comments</comments> <pubDate>Fri, 10 Jun 2011 02:14:26 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[EAPeak]]></category> <category><![CDATA[Networks]]></category> <category><![CDATA[Tests]]></category> <category><![CDATA[Weaknesses]]></category> <category><![CDATA[Wireless]]></category> <guid
isPermaLink="false">http://www.iphere.com/eapeak-tests-wireless-networks-for-authentication-weaknesses</guid> <description><![CDATA[A free new tool from security vendor SecureState may make it possible for wireless network administrators and security consultants to verify how strong their wireless authentication is, and whether it is possible for attackers to easily penetrate their network. EAPeak is a simple Python toolkit that will monitor access attempts to a wireless network and [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/eapeak-tests-wireless-networks-for-authentication-weaknesses/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>RSA Offers SMBs Strong Authentication Appliance For Remote Web Access</title><link>https://www.iphere.com/rsa-offers-smbs-strong-authentication-appliance-for-remote-web-access</link> <comments>https://www.iphere.com/rsa-offers-smbs-strong-authentication-appliance-for-remote-web-access#comments</comments> <pubDate>Fri, 28 Jan 2011 16:39:34 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Access]]></category> <category><![CDATA[Appliance]]></category> <category><![CDATA[Authentication]]></category> <category><![CDATA[Offers]]></category> <category><![CDATA[Remote]]></category> <category><![CDATA[SMBs]]></category> <category><![CDATA[Strong]]></category> <guid
isPermaLink="false">http://www.iphere.com/rsa-offers-smbs-strong-authentication-appliance-for-remote-web-access</guid> <description><![CDATA[RSA has announced Authentication Manager Express (AMX), a strong remote access authentication appliance for small and midsize businesses. AMX is designed as a simplified SMB alternative to RSA Authentication Manager, the enterprise-class software behind SecurID. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/rsa-offers-smbs-strong-authentication-appliance-for-remote-web-access/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>