Manage Digital Risk
Address Critical Business Needs
Wearables leaking your passwords? We can solve that.
Recently, I wrote about a newly published white-paper showing the power of wearable devices to help determine if users are who they claim to be, on a continuous basis. The paper describes a method, which in part relies on correlating a user’s gestures and movement on 2 devices in proximity of each other: The user’s...
Read more
Five Ways to Maximize Opportunity in the Digital Banking Era
Learn the five key factors driving digital transformation in financial services.
Biometric Security: Making Authentication More Secure and Convenient
Concerns about biometric security, its usability, and the potential for spoofing are starting to dissapate. Fingerprint sensors are now being built into the latest smartphone models, which means more people are becoming comfortable with the technology. Although some users still cite concerns with biometric security, convenience is the main driver for its increased...
Biometrics: A Next-Generation Authentication Mechanism
Biometrics: a next-generation authentication mechanism
3D Secure 2.0: Why It Pays to Be Ready
Learn about the benefits of 3D Secure 2.0 for issuers and merchants.
Translate Consumer Authentication into Happy Customers and Increased Revenue
See how risk-based authentication can increase revenue up to 20%.
A Trip Report from RSA Conference 2016: Modern Identity Management
For anyone who went to RSA Conference 2016 to get updated on the state of modern identity management technologies and practices, you undoubtedly got your money’s worth and came back to your office with plenty of ideas on how to improve your organization’s approach. Given its foundational role in information security, the topic of identity...
Proximity-Based Identity Assurance: Balancing Act Between Security & Convenience
For years, finding the right balance between security and usability has been one of the biggest challenges for identity and access management (IAM) solution architects and designers. There are ongoing efforts in the industry to replace password-based authentication with something more secure, more convenient, and with minimum investment; such proposed methods seem to...
4 Tips for End-to-end Passwordless Authentication for Hybrid Deployments
Four tips to go from a password-laden infrastructure to a passwordless one.
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.