authentication
![password](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100833/password-400x200.jpg)
MFA market to reach $34.7 billion by 2027
The global multi-factor authentication (MFA) market reached a value of $12.9 billion in 2021, and is expected to reach $34.7 billion by 2027, exhibiting a CAGR of 17.8% during …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
83% of employees continue accessing old employer’s accounts
In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted to …
![programming](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095527/programming-400x200.jpg)
Low code applications are essential for cybersecurity development in applications
One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184920/biometrics1-400x200.jpg)
MFA still offers the best chance of keeping data secure
Keyavi Data issued a set of best practices for keeping personal and business data out of criminal hands using multi-factor authentication (MFA). These best practices explain …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
Digital IDs under attack: How to tackle the threat?
Digital identification is the focus of two reports by the European Union Agency for Cybersecurity (ENISA): an analysis of self-sovereign identity (SSI) and a study of major …
![ecommerce](https://img.helpnetsecurity.com/wp-content/uploads/2019/12/05094040/ecommerce-400x200.jpg)
Spike in brand abuse attacks, 3-D Secure transaction volume rising
Outseer has published its latest quarterly Fraud & Payments report, confirming a troubling and massive spike in worldwide brand abuse attacks. The Q4 installment of the …
![online shopping](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102510/online_shopping-400x200.jpg)
How Buy Now, Pay Later is being targeted by fraudsters
Consumers are increasingly utilising Buy Now Pay Later (BNPL) payment options to make online purchases. Indeed, several e-commerce companies reported huge uptakes in sales, …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184922/biometrics2-400x200.jpg)
Governments struggle to deliver secure online citizen services
Auth0 released the findings of its Public Sector Identity Index, a global research report that provides government technology leaders with insight into the identity maturity …
![passwordless](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/29093807/passwordless_hns2-400x200.jpg)
Could passwordless be the solution to poor shopping sign-up processes?
Retailers could be shutting down huge revenue streams due to poor shopping sign-up processes, a study from Beyond Identity has revealed. A survey of more than 1,000 people in …
![Tom Wesselman](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/10083126/tom_wesselman_2-telesign-400x200.jpg)
Combating identity fraud: The key is to avoid stagnation
In this interview with Help Net Security, Tom Wesselman, CTO of TeleSign, explains how to successfully combat identity fraud to not only protect an organization but its …
![passwordless](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/19132738/passwordless-400x200.jpg)
Passwordless verification API transforms every mobile phone into a security token for zero trust access
What is small, tamper-proof, cryptographically secure, and already used by 6.37 billion people? The SIM card. We carry this compact piece of secure tech everywhere without …
![SIM](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/29194856/sim-card-400x200.jpg)
How to thwart SIM swapping attacks?
SIM swapping attacks have been reported in the media since 2017. Such attacks usually target banking transactions but not only. These attacks are also perpetrated against the …
Featured news
Resources
Don't miss
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer