identity protection
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/16165304/biometrics-1400-400x200.jpg)
Only 45% of organizations use MFA to protect against fraud
Most businesses struggle with identity verification and have concerns over ability to protect against AI, according to Ping Identity. Despite stronger protection solutions …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03124019/microsoft-soc-400x200.jpg)
Microsoft launches new initiative to augment security
Nearly 22 years after Bill Gates announced a concerted Microsoft-wide push to deliver Trustworthy Computing, the company is launching the Secure Future Initiative, to boost …
![1Password](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/24105938/1password-2024-1-400x200.jpg)
1Password also affected by Okta Support System breach
Following in the footsteps of BeyondTrust and CloudFlare, 1Password has revealed that it has been affected by the Okta Support System breach. “On September 29, we …
![account](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/21085008/account-hand-400x200.jpg)
Virtual claims raise alarms among insurance carriers and customers
As the digital revolution changes the claims process, both carriers and customers are increasingly concerned about data privacy, according to LexisNexis Risk Solutions. More …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
The staggering cost of identity fraud for financial services
The impact of identity fraud varies for organizations in the financial services industry, based on whether they belong to the banking or FinTech sector, according to Regula. …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2020/09/22135014/user-3d-400x200.jpg)
The rise of biometrics and decentralized identity is a game-changer for identity verification
The journey towards digital transformation for organizations and governments has been fraught with difficulties, resulting in some users needing to catch up as more digital …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
Best practices to secure digital identities
With cybersecurity incidents involving compromised credentials continually the most common cause of a data breach for enterprises – and account takeover for individuals, …
![Jeff Reich](https://img.helpnetsecurity.com/wp-content/uploads/2023/02/07124220/jeff_reich-2-idsa-400x200.jpg)
Combining identity and security strategies to mitigate risks
Last week, the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining …
![account](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/21085008/account-hand-400x200.jpg)
Stolen credentials are the most common attack vector companies face
60% of IT security decision makers believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20%), …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103433/architecture-400x200.jpg)
It’s time to shift from verifying data to authenticating identity
As fraudsters continue to develop increasingly sophisticated schemes that allow them to produce an apparent valid identity, either by stealing personal data or fabricating it …
![zero trust](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/25150019/zero_trust-color-400x200.jpg)
The importance of a zero trust-based approach to identity security
97 percent of senior security executives say attackers are increasingly trying to steal one or more types of credentials, a CyberArk survey reveals. As organizations move …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
A strategic approach to identity verification helps combat financial crime
70% of financial services organizations are taking a strategic approach to identity verification to combat financial crime and stay one step ahead of fraudsters according to …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD