Posts

biometrics in action

Biometrics in Action: Where Are Popular Forms of Authentication Being Used?

We’ve discussed the differences between two-factor authentication…
profile

Why Hack Pokemon Go? The Saga Continues...

When Pokemon Go launched a few weeks ago, I thought back to…
pokemon go and pikachu dolls

Authorization, Authentication, and Pokemon-Go

When I opened up my news feed last week, 80% of the updates and…
pokemon go and pikachu dolls

Integrated DB Server Management Tool: ISign+

Penta Security Systems’ ISign+ is an authentication security…