Technology news for New Zealand's largest enterprises
Multi-factor authentication / MFA
These search results are from across the Techday network of sites
Okta launches risk-based authentication with machine learning
The new feature will allow enterprises to automate security by implementing significantly stronger authentication techniques and remediation when the scenario calls for it.
Okta brings centralised identity security to servers
“Server access has traditionally relied on shared credentials that may never change, and that creates significant vulnerabilities for large or growing organisations.”
Opinion: BYOD can be secure with the right measures
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CSOs - are you prepared for cloud cryptojacking?
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Security and mobility app adoption increasing - Okta
The fastest-of-the-fastest growing apps focus on identity-driven security, indicating that companies are taking Zero Trust seriously.
Expert comment: What the Collection #2-5 data dump means for credential abuse
Techday spoke to experts and executives in the security industry about the data leak and the implications on phishing and credential stuffing.
Massive 2.2bil-username data dump leaked on dark web
This makes the second leak three times bigger than the Collection #1 dump leaked last month.
Ping Identity CTO’s cybersecurity predictions for 2019
“Our borderless world provides unprecedented freedom and convenience, but also breeds a whole new set of cybersecurity risks and concerns.”
2019: The year attackers steal faces - Forcepoint
While passwords may change, physical biometrics are genetic and specific to each person.
Exclusive: Three access management learnings from 2018
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
Hands-on review: Quick and easy authentication with YubiKeys
The #1 security key, featuring multi-protocol security.
Ping Identity announces new Identity-as-a-Service solution
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.
Check Point announces general availability for CloudGuard SaaS
CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email.
Exclusive: Securing cloud data in the APAC environment
The majority of users are unable to develop good cyber hygiene in line with the rapid rate of digitalisation that the APAC region is undergoing.
Interview: Building secure apps from the ground up
Security should be a key consideration from the initial design phase before any build even begins.
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.
Exclusive: Okta’s new GM shares its APAC strategy
“We believe that partnering with systems integrators, independent software vendors and consulting companies is a key factor of success for Okta.”
Facebook breach: Ready for the coming phishing wave?
Much of the information accessed in the Facebook breach is perfect for cyber criminals planning their next phishing attack.
Back to the basics: Five ways to stay safe online
Phishing attacks or social-engineering attacks are on the rise, where cybercriminals trick people into divulging details and participating in scams.
Interview: RSA's Craig Dore on the basics of MFA
A good MFA solution would cover access for both types of applications, and enable access for both employees and third parties such as contractors.
Exclusive: Why social media platforms are so vulnerable to cyber threats
Social media breaches, including the Cambridge Analytica-Facebook incident, accounted for approximately 56% of total records compromised in the first half of 2018.