Authentication Via Mobile Phone Enhances Login Security
2/24/2012Usernames and passwords are inadequate for strong authentication. Mobile devices are increasingly popular as a second factor.
Post a Comment

IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
