Authentication stories - Page 18
CSOs - are you prepared for cloud cryptojacking?
Mon, 18th Feb 2019
#
mfa
#
cloud security
#
iaas
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
WhatsApp users warned to change voicemail PINs
Mon, 18th Feb 2019
#
endpoint protection
#
mfa
#
iam
Attackers are allegedly gaining access to users' WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Security and mobility app adoption increasing - Okta
Fri, 8th Feb 2019
#
endpoint protection
#
mfa
#
iam
The fastest-of-the-fastest growing apps focus on identity-driven security, indicating that companies are taking Zero Trust seriously.
Expert comment: What the Collection #2-5 data dump means for credential abuse
Mon, 4th Feb 2019
#
mfa
#
phishing
#
email security
TechDay spoke to experts and executives in the security industry about the data leak and the implications on phishing and credential stuffing.
Massive 2.2bil-username data dump leaked on dark web
Fri, 1st Feb 2019
#
mfa
#
iam
#
cybersecurity
A colossal 2.2 billion unique usernames and passwords have surfaced on the dark web in the second major data dump in two weeks, rocking cybersecurity experts.
Yubico report reveals troubling password behaviour
Wed, 30th Jan 2019
#
iam
#
passwordless
#
cybersecurity
Some shocking results include that 57% of respondents who have experienced a phishing attack have not changed their password behaviours.
Ping Identity CTO's cybersecurity predictions for 2019
Tue, 22nd Jan 2019
#
malware
#
mfa
#
fintech
Ping Identity CTO Bernard Harguindeguy predicts a rise in zero trust security, fewer MFA attacks, and heightened focus on API protection in 2019.
USB regulatory body launches USB-C authentication programme
Wed, 9th Jan 2019
#
iam
#
cybersecurity
#
digicert
USB Type-C Authentication empowers host systems to mitigate risks from malicious firmware/hardware in USB devices attempting to exploit a USB connection.
Akamai acquires Janrain for access management capabilities
Wed, 9th Jan 2019
#
ddos
#
iam
#
cybersecurity
Akamai Technologies is set to acquire Janrain, enhancing their Intelligent Edge Platform with advanced customer identity and access management capabilities.
Hands-on Review: Quick and easy authentication with YubiKeys
Wed, 12th Dec 2018
#
gaming
#
mfa
#
digital entertainment
Consumers tend to believe that setting up two-factor authentication puts them at the height of cybersecurity best practice – but this belief is misled.
Ping Identity announces new Identity-as-a-Service solution
Wed, 5th Dec 2018
#
devops
#
mfa
#
iam
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.
HID Global brings high authentication to mobile
Thu, 29th Nov 2018
#
endpoint protection
#
iam
#
edr
The company's new offering brings the security of physical authentication to Android and iOS with near-field communication technology.
Check Point announces general availability for CloudGuard SaaS
Wed, 28th Nov 2018
#
saas
#
endpoint protection
#
mfa
Check Point launches CloudGuard SaaS, offering comprehensive protection against advanced threats to SaaS applications and cloud-based email services.
Interview: Building secure apps from the ground up
Tue, 13th Nov 2018
#
mfa
#
iam
#
apm
Building secure apps from the ground up is crucial as digital transformation empowers firms to automate. Mobile Mentor's Liz Knight discusses key strategies.
Three access management trends making waves in APAC
Thu, 8th Nov 2018
#
mfa
#
iam
#
data privacy
Identity and Access Management (IAM) emerges as a key cybersecurity focus in APAC, driven by severe impacts of cyber attacks and stringent GDPR regulations.
Exclusive: Okta's new GM shares its APAC strategy
Fri, 19th Oct 2018
#
mfa
#
iam
#
cybersecurity
Identity solutions provider Okta has appointed Graham Sowden as its new general manager for the Asia-Pacific region.
Back to the basics: Five ways to stay safe online
Tue, 16th Oct 2018
#
firewalls
#
network infrastructure
#
network security
Phishing attacks or social-engineering attacks are on the rise, where cybercriminals trick people into divulging details and participating in scams.
Interview: RSA's Craig Dore on the basics of MFA
Mon, 15th Oct 2018
#
mfa
#
iam
#
cybersecurity
A good MFA solution would cover access for both types of applications, and enable access for both employees and third parties such as contractors.
Exclusive: Why social media platforms are so vulnerable to cyber threats
Wed, 10th Oct 2018
#
mfa
#
iam
#
cybersecurity
Social media platforms are increasingly at risk of cyber threats, with six breaches in 2018 exposing over 56% of compromised records globally.
How online retail businesses need to bundle security into customer experience
Mon, 8th Oct 2018
#
crm
#
mfa
#
cx
eCommerce sites, in particular, are increasingly targeted by hackers due to the sensitive payment card information.