RSA Security's proposed acquisition of privately held Cyota will allow the company to offer a relatively cheap two factor, non token-based authentication system for its banking customers. RSA is ...
With the rise in identity theft and online security breaches, RSA Security seems poised to take off. But how far it goes depends on how well the company is able to expand its authentication technology ...
BEDFORD, Mass., July 22 /PRNewswire/ -- RSA, The Security Division of EMC (NYSE: EMC) announced the availability of the RSA SecurID(R) Software Token for iPhone Devices that enables an iPhone to be ...
RSA Security expanded its line of tokens in two directions on Tuesday, launching both a browser toolbar and a hardware token that can electronically “sign” online transactions. The introductions at ...
BEDFORD, Mass., July 22 /PRNewswire/ -- RSA, The Security Division of EMC announced the availability of the RSA SecurID Software Token for iPhone Devices that enables an iPhone to be used as an RSA ...
Security tokens used to safeguard computer networks risk going the way of the rotary phone as EMC's RSA unit, the top maker of the devices, is challenged by smartphones deployed as cyber-protection ...
VC firm Grand Oaks Capital provided an additional $30 million of financing for inventory and working capital in support of the company’s overall growth and future product development; Token appointed ...
Marguerite Reardon started as a CNET News reporter in 2004, covering cellphone services, broadband, citywide Wi-Fi, the Net neutrality debate and the consolidation of the phone companies. I always ...
The app works with a SecurID token seed and RSA's Authentication Manager; together they can provide a one-time password that changes every minute. This password is used to securely access a VPN, WLAN, ...
Four days after security firm RSA announced that it had been hacked, and then refused to say more, experts were openly questioning whether any of its 40 million SecurID tokens should continue to be ...
Has someone declared a cyber war against government contractors? Two more cyberattacks, this time against Northrop Grumman Corp. and L-3 Communications Inc., have been reported, barely a week after an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results