Please turn on your JavaScript for this page to function normally.
Organizations have little control over privileged access

Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated …

Windows 10 will let you log in with your face and fingerprint

Windows 10 will be out this summer, available in 111 languages and in 190 countries around the world. In an effort to boost their (legal) numbers in China, Microsoft will …

Many admit that passwords are their only IT security measure

New research from SecureAuth shows that despite much debate, the password isn’t dead yet as two in five IT decision makers (ITDMs) admit that passwords are their only IT …

Windows 10 will offer password-free authentication

The upcoming Windows 10 will offer more authentication options instead of just passwords, Dustin Ingalls, Group Program Manager for Windows Security & Identity, has …

UK banks’ customers can access accounts with their fingerprint

iPhone users who are also customers of UK banks RBS and NatWest can now access their online banking app by simply pressing their finger on their phone’s home button. The …

How to enable two-step verification for iMessages and FaceTime

After having added a two-step verification feature to allow users to secure their iCloud (Apple ID) accounts, and extending the protection to iCloud backups last September, …

Researcher publishes 10 million usernames and passwords to aid future research

Independent IT security analyst Mark Burnett has released a cleaned up cache of 10 million username and password combinations, in order to give researchers a data set that can …

Multi-factor authentication market will be worth US$1.6 billion by the end of 2015

ABI Research found that the global mobile multi-factor authentication software and service market will be worth US$1.6 billion by the end of 2015. Username and passwords have …

IBM’s sophisticated cryptographic algorithm protects your identity

IBM researchers revealed plans for a cloud-based technology, called Identity Mixer, that uses a cryptographic algorithm to encrypt the certified identity attributes of a user, …

Employees would sell passwords for $150

SailPoint uncovered a widespread level of employee indifference towards protecting sensitive corporate data, including personal information of customers. In fact, an alarming …

DMARC: The time is right for email authentication

It is a rare thing to be given the opportunity to right a historic wrong. The root of essentially every Internet security issue in history is the same—architects try to build …

Bold reform needed to strengthen U.S cybersecurity

Mr. President, the status quo in cybersecurity is failing the U.S. It is failing the commercial sector, which is being publicly breached on a weekly basis, and it is failing …

Don't miss

Cybersecurity news