The buzz: Are you really “you”?
Authentication techniques designed to confirm that you are who you say you are, typically entail one or more of three techniques: “Something I have”, “Something I know,” “Something I am”.
Thus, accessing the things and information we value can range from easy – like simple physical keys that let you open your home and start your car – to complex passwords intended to protect the privacy of your medical records and our national secrets.
But we’re all in a hurry today. And while we clamor for faster, easier security processes, persistent thieves are toiling overtime to continue stealing our identities and our money. And that’s the “key” challenge in authentication.
The experts speak.
Gerlinde Zibulksi, SAP: “My password is SECURE.”
Hillel Zafir, HMS Technology Group: “A bad plan well executed is better than a good plan not executed.” (George S. Patton, Jr.)
Richard McCammon, Delego: “Those who cannot remember the past are condemned to repeat it.” (George Santayana)
Join us for Data Security in the Age of Credit Card Breaches: Authentication – Part 3.