Please turn on your JavaScript for this page to function normally.
passwordless
Passwordless will overtake other methods to secure employee identities

Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more …

password
Businesses want technologies that allow for passwordless workflows

Bitwarden announced the results of its 2023 Password Decisions Survey, which polled 800 IT decision makers across a wide range of industries, showing that passwordless …

passwordless
The future of MFA is passwordless

Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more …

lock
Overcoming the roadblocks to passwordless authentication

It’s a well-known fact that humans are the weakest link in any security strategy. Verizon’s latest annual data breach report found that over 80% of breaches in the “Basic Web …

passwordless
What are the benefits of passwordless authentication?

In this video for Help Net Security, Christofer Hoff, Chief Secure Technology Officer at LastPass, talks about the benefits of passwordless authentication. The basic …

passwordless
The future is passwordless. What’s slowing it down?

Ping Identity and Yubico surveyed IT leaders across the globe to determine their appetite for passwordless solutions. Overwhelmingly, the desire was clear to adopt more secure …

Apple passkey
Apple unveils passkeys for passwordless authentication to apps and websites

At WWDC 2022, Apple has announced and previewed iOS 16 and iPad OS 16, macOS 13 (aka macOS Ventura), watchOS 9, their new M2 chips, new MacBook Air and Pro, as well as new …

shield
The 6 steps to a successful cyber defense

The Ransomware Spotlight Year-End Report from Ivanti, conducted in partnership with Cyber Security Works and Cyware, found that there is now a total of 157 ransomware families …

Lori Osterholm
Good end user passwords begin with a well-enforced password policy

In this interview with Help Net Security, Lori Österholm, CTO at Specops Software, explains what makes passwords vulnerable and suggests some password best practices and …

Terminal
Why low-code and identity must co-exist

Software development has emerged as a critical task for organizations looking to compete in the digital economy. It increasingly fuels innovation and even disruption. Yet, …

cloud
The challenge of planning an IAM strategy for multi-cloud environments to avoid risk

According to the Strata Identity and Forrester study, 78% of IT decision-makers said managing user identities between multiple clouds is the number one challenge. The study …

Den Jones
How to become a passwordless organization

In this interview with Help Net Security, Den Jones, CSO at Banyan Security, explains the benefits of implementing passwordless authentication and the process every …

Don't miss

Cybersecurity news