RSA Security's proposed acquisition of privately held Cyota will allow the company to offer a relatively cheap two factor, non token-based authentication system for its banking customers. RSA is ...
With the rise in identity theft and online security breaches, RSA Security seems poised to take off. But how far it goes depends on how well the company is able to expand its authentication technology ...
BEDFORD, Mass., July 22 /PRNewswire/ -- RSA, The Security Division of EMC (NYSE: EMC) announced the availability of the RSA SecurID(R) Software Token for iPhone Devices that enables an iPhone to be ...
RSA Security expanded its line of tokens in two directions on Tuesday, launching both a browser toolbar and a hardware token that can electronically “sign” online transactions. The introductions at ...
Security tokens used to safeguard computer networks risk going the way of the rotary phone as EMC's RSA unit, the top maker of the devices, is challenged by smartphones deployed as cyber-protection ...
The attack bypasses protections built in RSA's 2-factor authentication system. Weird, I'd never would have made a windows app for the rsa thingy; that's just asking for it to be compromised. If you ...
VC firm Grand Oaks Capital provided an additional $30 million of financing for inventory and working capital in support of the company’s overall growth and future product development; Token appointed ...
The app works with a SecurID token seed and RSA's Authentication Manager; together they can provide a one-time password that changes every minute. This password is used to securely access a VPN, WLAN, ...
Marguerite Reardon started as a CNET News reporter in 2004, covering cellphone services, broadband, citywide Wi-Fi, the Net neutrality debate and the consolidation of the phone companies. I always ...
In an acknowledgement of the severity of its recent computer compromise, RSA Security said Monday that it will replace SecureID tokens for any customer that asks. In an acknowledgement of the severity ...
Branch offices aren’t always just nests for employees further down the food chain. Sometimes they comprise critical pieces of business infrastructure that are just geographically removed from HQ.
As online scams get more sophisticated, passwords are becoming hopelessly outmoded--as passe as floppy disks. Yet many businesses and nearly all consumers still rely on passwords as the primary means ...