authentication
Organizations have little control over privileged access
Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated …
Windows 10 will let you log in with your face and fingerprint
Windows 10 will be out this summer, available in 111 languages and in 190 countries around the world. In an effort to boost their (legal) numbers in China, Microsoft will …
Many admit that passwords are their only IT security measure
New research from SecureAuth shows that despite much debate, the password isn’t dead yet as two in five IT decision makers (ITDMs) admit that passwords are their only IT …
Windows 10 will offer password-free authentication
The upcoming Windows 10 will offer more authentication options instead of just passwords, Dustin Ingalls, Group Program Manager for Windows Security & Identity, has …
UK banks’ customers can access accounts with their fingerprint
iPhone users who are also customers of UK banks RBS and NatWest can now access their online banking app by simply pressing their finger on their phone’s home button. The …
How to enable two-step verification for iMessages and FaceTime
After having added a two-step verification feature to allow users to secure their iCloud (Apple ID) accounts, and extending the protection to iCloud backups last September, …
Researcher publishes 10 million usernames and passwords to aid future research
Independent IT security analyst Mark Burnett has released a cleaned up cache of 10 million username and password combinations, in order to give researchers a data set that can …
Multi-factor authentication market will be worth US$1.6 billion by the end of 2015
ABI Research found that the global mobile multi-factor authentication software and service market will be worth US$1.6 billion by the end of 2015. Username and passwords have …
IBM’s sophisticated cryptographic algorithm protects your identity
IBM researchers revealed plans for a cloud-based technology, called Identity Mixer, that uses a cryptographic algorithm to encrypt the certified identity attributes of a user, …
Employees would sell passwords for $150
SailPoint uncovered a widespread level of employee indifference towards protecting sensitive corporate data, including personal information of customers. In fact, an alarming …
DMARC: The time is right for email authentication
It is a rare thing to be given the opportunity to right a historic wrong. The root of essentially every Internet security issue in history is the same—architects try to build …
Bold reform needed to strengthen U.S cybersecurity
Mr. President, the status quo in cybersecurity is failing the U.S. It is failing the commercial sector, which is being publicly breached on a weekly basis, and it is failing …
Don't miss
- Why cloud vulnerabilities need CVEs
- Making cybersecurity more appealing to women, closing the skills gap
- Building a strong cloud security posture
- Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades
- Triangulation fraud: The costly scam hitting online retailers