Wednesday, November 12, 2014

How the threat landscape challenges authentication - old and new (SC Magazine)  — The growing cyber-threat landscape poses some awkward questions for present and future authentication methods.