Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking...
Shared workstations are low-hanging cyberattack targets. Organizations today face an evolving cyber threat landscape which continues to grow in sophistication. Insecure shared workstation practices such as password sharing and the use of sticky-notes for passwords are common in shared workstation and shared device...
The global regulatory landscape is changing rapidly to keep pace with evolving cyber attacks and the accelerated digital transformation driven by COVID-19. While many industry regulations and frameworks mandate authentication to secure access and control for sensitive and critical assets, not all authentication is...
Organizations are increasingly becoming victims of ransomware attacks. This had long been foreshadowed with experts having estimated that a ransomware attack will occur every 11 seconds in 2021. When it comes to ransomware it’s not a question of if your organization will be targeted, but when.
Ransomware and its...
The manufacturing industry has been an emerging target for cyber attacks, including sophisticated malware, ransomware, and phishing attacks. If your organization gets hacked, not only do you face highly consequential data breach costs, but you also risk loss of production time, intellectual property, and/or product...
The guardrails organizations use to protect employee identities are often ineffective for contractors, business partners or vendors since they bring their own devices. Many businesses struggle to implement identity safeguards in a setting that's more heterogeneous and offers fewer controls.
In this audiocast with Information Security Media Group, Joe Garber explains why a single authentication platform is the best way to gain a holistic view across information silos, enabling automation of key actions.
As companies have gone through a digital transformation, increased adoption of cloud and Internet of Things (IoT), a growing remote workforce, and a technology talent shortage have led to an exponential rise in organizations' attack surface. This expansion makes it harder for security teams to correlate externally...
PayPal is notifying 34,942 Americans that a hacker accessed their personal information during a two-day credential stuffing attack in early December. The San Jose, California-based company says it has not detected unauthorized transactions emanating from affected accounts.
Attackers have caught up with legacy multifactor authentication tools that use push technology or one-time passcodes, boosting the need for phishing-resistant MFA, says Jeremy Grant. In response, government officials such as CISA Director Jen Easterly have championed FIDO since it's mature and open.
Moving from certificate-based to FIDO authentication reduces overhead and complications for enterprises looking to move away from passwords, says Microsoft's Libby Brown. FIDO allows organizations to go passwordless by simply buying a FIDO key and turning it on in their Azure Active Directory.
Passwordless authentication will gain traction once it addresses edge cases such as logging into Netflix using a remote control, says Hypr CEO Bojan Simic. He shares how a QR code and a biometric identifier on a smartphone can transform the way someone accesses the Wi-Fi at a friend's house.
The FIDO2 standard has driven the adoption of multifactor authentication as well as the embrace of passkeys and conditional UI, says Superlunar's Nick Steele. FIDO2 will help users adopt passwordless flows while protecting websites with public key credentials in a way that hadn't been possible.
Passwords are a major security flaw, yet still remain a staple of most enterprises. KuppingerCole Analysts provide insight on going passwordless for your Zero Trust initiatives.
Read “A Passwordless Future Begins with Credential Management” for insight on:
Improving your organization's security posture...
Cybersecurity leaders must address high levels of complexity regarding authentication and identity security – in fact, 70% say they are overwhelmed by their authentication practices. A survey conducted by Censuswide explore why, as how to get ahead of the challenge.
Download “The 2022 Authentication Survey...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.