Please turn on your JavaScript for this page to function normally.
Speed
Why businesses need IAM to push their zero trust frameworks forward

Many organizations are finding themselves between a rock and a hard place when it comes to the security of their digital transformation strategies. On the one hand, the number …

OpenSSH
OpenSSH adds protection against Spectre, Meltdown, RAMBleed

OpenSSH, a widely used suite of programs for secure (SSH protocol-based) remote login, has been equipped with protection against side-channel attacks that could allow …

identity
Beating biometrics: Why biometric authentication alone is not a panacea

As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it …

Password
Insecure password memory aids: A passwordless future could be the solution

There is a readiness for passwordless security methods such as biometrics, with 70% workers believing biometrics would benefit the workplace, according to Okta. The …

email
3.4 billion fake emails are sent around the world every day

At least 3.4 billion fake emails are sent around the world every day — with most industries remaining vulnerable to spear-phishing and “spoofing” cyberattacks simply because …

payments
Will biometrics replace passwords for online payment authentication?

Over half of consumers in the UK (53 percent) are worried that the shift to biometrics to authenticate online payments will dramatically increase the amount of identity fraud, …

Sign in with Apple
Apple debuts privacy-minded “Sign in with Apple” SSO

Among the many news shared during Apple’s annual developer conference there’s one that stands out: the introduction of “Sign in with Apple”. About the …

see
Researchers spot manipulated photos and video using AI-driven imaging system

To thwart sophisticated methods of altering photos and video, researchers at the NYU Tandon School of Engineering have demonstrated an experimental technique to authenticate …

keys
Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and …

Google Titan
Google offers free replacement for buggy Titan Security Keys

Misconfigured Bluetooth pairing protocols in Google’s Titan Security Keys may allow attackers to communicate with users’ security key or with the device their key …

keys
PSD2 and strong customer authentication: Are all elements equal?

The European Payment Services Directive 2 (PSD2), introduced in January 2018, contains the requirement for additional security features for certain online transactions. These …

laptop
Cybercriminals thriving on companies overlooking fundamental security requirements

IT leaders in the United States are putting business data at risk by not effectively managing employees’ passwords, according to OneLogin research. Despite the fact that 91% …

Don't miss

Cybersecurity news