Critical Infrastructure SecurityBreaking down the updated FFIEC guidanceSarah FenderSeptember 15, 2011As attackers have found a way to break traditional online banking security controls, recently issued guidelines offer some new advice for financial institutions.
ContentCan the phone be a second factor in authenication?Sarah FenderOctober 5, 2009Phone-based solutions leverage something the user always has for a second method of identification, namely, access to mobile or landline phones.