eBook: Biometric Authentication For Dummies
How can you be sure that someone is who they say they are, if they’re not standing in front of you? In a digital world, how can organizations be sure that an individual attempting to access online services is who they claim to be? Or that they exis.....»»
The new imperative in API security strategy
Of the 239 vulnerabilities, 33% (79 out of 239) were associated with authentication, authorization and access control (AAA) — foundational pillars of API security, according to Wallarm. Prioritizing AAA principles Open authentication (OAuth), singl.....»»
OneSpan DIGIPASS FX1 BIO protects against social engineering and account takeover attacks
OneSpan introduced its latest innovation to the Digipass Authenticators product line, with DIGIPASS FX1 BIO. This physical passkey with fingerprint scan empowers organizations to embrace passwordless authentication while providing the utmost security.....»»
Bitwarden launches passkey management for passwordless authentication across accounts
Bitwarden has launched passkey management, enabling every user to create, manage, and store passkeys in their vaults. Users can now quickly and securely log into passkey-enabled websites through the Bitwarden web extension. The synchronized passkeys.....»»
Microsoft introduces new access policies in Entra to boost MFA usage
As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to increase the use of multifactor authentication (MFA) for enterprise accoun.....»»
eBook: Keeping Active Directory out of hackers’ cross-hairs
Active Directory is a prime target for threat actors, and companies must act now to eliminate it as a threat vector permanently. Read the e-book to review: Active Directory (AD) and what it provides Threats and how to keep hackers out of AD Ways to p.....»»
No, Okta, senior management, not an errant employee, caused you to get hacked
If a transgression by a single employee breaches your network, you're doing it wrong. Enlarge (credit: Omar Marques/SOPA Images/LightRocket via Getty Images) Identity and authentication management provider Okta on Friday.....»»
Okta hit by another breach, this one stealing employee data from 3rd-party vendor
Threat actor gained access to vendor's IT environment and exfiltrated personal data. Enlarge (credit: Getty Images) Identity and authentication management provider Okta has been hit by another breach, this one against a.....»»
Amazon now lets you log in with Apple"s Face ID or Touch ID and Passkeys
Amazon users are now able to log in to their accounts with a Passkey, meaning biometric authentication such as Face ID or Touch ID.Apple passkey registrationApple introduced support for Passkeys in iOS 16, with the idea that you are already identifie.....»»
Okta says hackers breached its support system and viewed customer files
Hackers obtained valid credentials, but Okta doesn't say how. Enlarge (credit: Getty Images) Identity and authentication management provider Okta said hackers managed to view private customer information after gaining ac.....»»
Legacy authentication leads to growing consumer frustration
Despite widespread usage of passwords lingering on, consumers want to use stronger, more user-friendly alternatives, according to FIDO Alliance. Entering a password manually without any form of additional authentication was the most commonly used aut.....»»
Zumigo introduces QR code for passwordless login
Zumigo launched a functionality within the Zumigo Assure Authentication product that facilitates the transfer of verified trust from a user’s mobile phone to a desktop, laptop and tablet. The functionality is made possible with a crucial new featur.....»»
Arcitecta Mediaflux Pocket protects enterprise data
Arcitecta announced Mediaflux Pocket, a multifactor authentication and authorization (MFA&A) application that helps businesses meet data security compliance standards, while significantly reducing the risk of unauthorized access to sensitive data. Th.....»»
This $35 AI writes and publishes e-books for you
Create and sell e-books with help from Artificial Intelligence with a $35 lifetime subscirption to My AI eBook Creation Pro. TL;DR: As of October 16, get a lifetime subscription to My AI eBook Creation Pro for just $34.99 — that's 91% off.....»»
Amazon: AWS root accounts must have MFA enabled
Amazon wants to make it more difficult for attackers to compromise Amazon Web Services (AWS) root accounts, by requiring those account holders to enable multi-factor authentication (MFA). MFA options for AWS accounts AWS provides on-demand cloud comp.....»»
Critical vulnerabilities in Exim threaten over 250k email servers worldwide
Remote code execution requiring no authentication fixed. 2 other RCEs remain unpatched. Enlarge (credit: Getty Images) Thousands of servers running the Exim mail transfer agent are vulnerable to potential attacks that ex.....»»
Nintendo adds passkey support to enable passwordless sign-ins
In the continued march toward a passwordless future, Nintendo has signed on as the latest company to support passkey authentication. Starting this week, you can now register a passkey to your Nintendo Account and use biometrics to log into your accou.....»»
Mitek partners with Equifax to improve consumer identity protection
Mitek announced a strategic partnership with Equifax, a global data, analytics and technology company. The agreement will add Mitek’s biometric-based identity verification and liveness detection technology to Equifax’s digital identity software,.....»»
Enterprises persist with outdated authentication strategies
Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber threats, organizations are st.....»»
SecuX Shield BIO enhances crypto security
SecuX revealed its latest creation, the Shield BIO card-type hardware wallet. The Shield BIO combines biometric fingerprint authentication with the handy format of a credit card. At the heart of this wallet is the military-grade Secure Element chip,.....»»
Migration in West Africa: New study on Nigeria shows the ambivalence of biometric ID systems
Most states in West Africa lack reliable data on the number and origin of migrants living within their borders. Rulers often exploit this lack of clarity in a way that consolidates their own position of power. Biometric ID technologies play a key rol.....»»