However, Crawford noted, "The most immediate application for the technology is for authenticating an endpoint in a traditional IT environment - laptops, desktops, and mobile devices using Intel chipsets." 2. Hardware authentication can be particularly important for the Internet of Things (IoT) where a network wants to ensure that the thing trying to gain access to it is something that should have access to it. "We've seen this in other manifestations, such as licensing technologies and tokens." "This isn't new," said Scott Crawford, research director for information security at 451 Research. In the case of Authenticate, the device becomes the what-you-have. Good authentication requires three things from users: what they know, such as a password who they are, such as a username and what they have, such as a token. Intel has built on previous efforts to dedicate a portion of the chipset for security functions to make a device part of the authentication process. It can combine a variety of hardware-enhanced factors at the same time to validate a user's identity. Intel is moving in that direction with the Authenticate solution in its new, sixth-generation Core vPro processor. One method is to bake authentication into a user's hardware. Clearly, a more secure form of authentication is needed. The inadequacies of usernames and passwords are well known. How can the playing field be tilted in favor of the infosec warriors? Here are five emerging security technologies that may be able to do that. As soon as the white hats counter one form of black-hat malicious behavior, another malevolent form rears its ugly head. The war between data defenders and data thieves has been described as a cat-and-mouse game.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |