The buzz: Are you really “you”?
Authentication techniques designed to confirm you are who you say you are, typically entail one or more of three techniques: "Something I have", "Something I know," "Something I am". Thus, accessing the things and information we value can range from easy – like physical keys to our home and our car – to complex passwords intended to protect the privacy of our medical records and national secrets. But we're in a hurry. And as we clamor for faster, easier processes, persistent thieves are toiling overtime to continue stealing our identities and our money. Aye, there's the challenge.
The experts speak.
Gerlinde Zibulksi, SAP: “My password is SECURE.”
Hillel Zafir, HMS Technology Group: “A bad plan well executed is better than a good plan not executed" (George S. Patton, Jr.).
Richard McCammon, Delego: “Those who cannot remember the past are condemned to repeat it" (George Santayana).
Join us for Data Security in the Age of Credit Card Breaches – Authentication.