Please turn on your JavaScript for this page to function normally.
identity
Using just-in-time access to reduce cloud security risk

Excessive privileges are a continuing headache for security professionals. As more organizations migrate assets to the cloud, users with excessive permissions can expand the …

deepfakes
The true numbers behind deepfake fraud

The use of artificial intelligence can result in the production of deepfakes that are becoming more realistic and challenging to differentiate from authentic content, …

Eva Maler
Overcoming industry obstacles for decentralized digital identities

In this Help Net Security interview, Eve Maler, CTO at ForgeRock, talks about how digital identities continue to play a critical role in how we access online services …

lock
5 steps to building NSA-level access control for your app

Access control has become a main concern when it comes to developing secure web applications, and the NSA has a lot to say about it. Especially when it comes to the biggest …

chess
MSPs urged to refine security solutions in response to growing SMB needs

MSPs are focusing on automation and integration between their core tools to improve efficiency, service delivery and cost management, according to Kaseya. Automation, …

money
The staggering cost of identity fraud for financial services

The impact of identity fraud varies for organizations in the financial services industry, based on whether they belong to the banking or FinTech sector, according to Regula. …

face
The foundation of a holistic identity security strategy

Only 9% of organizations are taking an agile, holistic and mature approach to securing identities throughout their hybrid and multi-cloud environments, according to CyberArk. …

user
The rise of biometrics and decentralized identity is a game-changer for identity verification

The journey towards digital transformation for organizations and governments has been fraught with difficulties, resulting in some users needing to catch up as more digital …

Tomasz Kowalski
Protect your entire business with the right authentication method

In this Help Net Security interview, Tomasz Kowalski, CEO at Secfense emphasizes the significance of multi-factor authentication in the corporate landscape, highlights the use …

glasses
Best practices to secure digital identities

With cybersecurity incidents involving compromised credentials continually the most common cause of a data breach for enterprises – and account takeover for individuals, …

identity
Navigating the future of digital identity

1,450 global consumers’ experiences with passwordless authentication, hybrid identities, and ownership over personally identifiable information reveal that they want …

risk
Dormant accounts are a low-hanging fruit for attackers

Successful attacks on systems no longer require zero-day exploits, as attackers now focus on compromising identities through methods such as bypassing MFA, hijacking sessions, …

Don't miss

Cybersecurity news