January 24, 2023
Via: CSO OnlinePasswords are a central aspect of security infrastructure and practice, but they are also a principal weakness involved in 81% of all hacking breaches. Inherent useability problems make passwords difficult for users to manage safely. These security and useability shortcomings […]
January 10, 2023
Via: Dark ReadingMoving Analytics, leading provider of virtual cardiac rehabilitation and prevention, announced that it is launching single sign-on authentication for its entire software platform. This means that any clinician user will require one set of login credentials from their host enterprise […]
December 16, 2022
Via: CSO OnlineWe certainly live in interesting times. Technology has been an enabler and has leveled the playing field for so many companies around the world, giving them the ability to compete against companies hundreds of times their size. The Internet has […]
December 7, 2022
Via: Help Net SecurityBitwarden has unveiled a new passwordless authentication feature that makes it easier and faster for users to access their Bitwarden vaults. This latest announcement reinforces the Bitwarden commitment to help customers protect sensitive information at every point of their passwordless […]
December 7, 2022
Via: Help Net SecurityValidSoft unveils See-Say Trusted Identity Assurance, a new digit-based voice authentication solution that provides trusted identity assurance – and therefore security – in enterprise remote access (ZTNA/PAM/IAM). The solution counters credential theft, social engineering hacks, replay attacks, and synthetic voice […]
November 17, 2022
Via: Help Net SecuritySpecops Software released a research analyzing the top passwords used in live attacks against Remote Desktop Protocol (RDP) ports. This analysis coincides with the latest addition of over 34 million compromised passwords to the Specops Breached Password Protection Service, which […]
November 7, 2022
Via: Help Net SecurityLastPass released findings from its fifth annual Psychology of Password report, which revealed even with cybersecurity education on the rise, password hygiene has not improved. Regardless of generational differences across Boomers, Millennials and Gen Z, the research shows a false […]
October 25, 2022
Via: Help Net SecurityProve Identity launches Prove Auth, a next-generation solution for passwordless login and omnichannel authentication. Prove Auth enables companies to reduce reliance on passwords and one-time passcodes (OTPs) and empowers consumers to frictionlessly authenticate in all channels including phones, desktops and […]
October 19, 2022
Via: TechRadarWhile digital technologies keep evolving, so do the threats you can face online. This is why you should consider getting yourself a diversified array of security tools to protect your most sensitive data. So, why not take advantage of this […]
October 10, 2022
Via: Net SecurityAccess control is the heart of data protection. Striking the right balance between easy access and tight security isn’t easy, but getting it right is how you maintain business agility while still meeting regulatory and fiduciary data protection responsibilities. Role-based […]
October 4, 2022
Via: Help Net SecurityFor decades cybersecurity professionals held tight to the idea that passwords needed to be changed on a regular basis. In recent years, however, organizations such as NIST and Microsoft have abandoned this longstanding best practice and are now recommending against […]
September 1, 2022
Via: CSO OnlinePassword management vendor Dashlane has announced the introduction of integrated passkey support in its password manager, unveiling an in-browser passkey solution to help tackle the issue of stolen/misused passwords. The launch comes as the “passwordless authentication” era edges closer with […]
August 25, 2022
Via: Help Net SecurityAvast has launched a Ransomware Shield for businesses, offering organizations an extra layer of protection against ransomware attacks. This will ensure businesses can secure their files and customer data, with proactive protection which prevents unauthorized access. The new feature is […]
August 19, 2022
Via: TechRadarMulti-factor authentication is a great way to keep cybercriminals at bay, but some are apparently getting pretty good at bypassing this type of protection by stealing application and browser session cookies. Cybersecurity researchers from Sophos say they’re observing an increasing […]
August 16, 2022
Via: Help Net SecurityIt’s a well-known fact that humans are the weakest link in any security strategy. Verizon’s latest annual data breach report found that over 80% of breaches in the “Basic Web Application Attacks” incident pattern were due to stolen credentials. Not […]
August 11, 2022
Via: Help Net SecurityIn Las Vegas, at Black Hat USA 2022, Syxsense announced Syxsense Zero Trust, a module within Syxsense Enterprise that enables endpoint compliance with Zero Trust Network Access policies (ZTNA). Zero Trust initiatives require focus on endpoint protection, but traditional authentication […]
August 3, 2022
Via: TechRadarApple has revealed more details on its plans to try and remove passwords from our daily lives with its new Passkeys tool. Despite announcing Passkeys at WWDC 2022 in June, the company has left us craving more and more information […]
Access control, Application security, Security
July 20, 2022
Via: Help Net SecurityCato DLP is part of Cato SSE 360, the only Security Service Edge (SSE) architecture to provide total visibility, optimization, and control of all traffic while providing a seamless migration path to full SASE transformation. Cato has also added Cato […]
July 20, 2022
Via: Help Net SecuritySpecops Software released new research finding cybersecurity weaknesses in business web apps including Shopify, Zendesk, Trello, and Stack Overflow. Amid a wave of cybersecurity incidents related to the COVID-19 pandemic, remote work, and nation-state activity, password security is more important […]
Access control, Cyber-crime, Malware, Security
July 18, 2022
Via: Help Net SecurityA threat actor is targeting industrial engineers and operators with trojanized password-cracking software for programmable logic controllers (PLCs) and human-machine interfaces (HMIs), exploiting their pressing needs to turn industrial workstations into dangerous bots. According to Dragos researchers, the adversary seems […]