Reducing credential complexity with identity federation
In this Help Net Security interview, Omer Cohen, Chief Security Officer at Descope, discusses the impact of identity federation on organizational security and user experience. He explains how this approach streamlines credential management and enhanc.....»»

How and where to report cybercrime: What you need to know
Cybercrime reporting mechanisms vary across the globe, with each country offering different methods for citizens to report cybercrime, including online fraud, identity theft, and other cyber-related offenses. Victims are usually instructed to complet.....»»
Scientific breakthrough could make X-ray scans safer by reducing radiation
X-rays have fundamentally revolutionized healthcare, giving us views of the human body and even almost impossible views of atoms. However, the radiation involved in X-rays … The post Scientific breakthrough could make X-ray scans safer by reduc.....»»
Oscilar Cognitive Identity Intelligence Platform combats AI-powered fraud
Oscilar unveiled its Cognitive Identity Intelligence Platform to combat the rising tide of AI-powered fraud. The platform’s proprietary “Digital & Behavior Identification” technology transforms digital identity verification in an er.....»»
VPNs and Online Gaming: Protecting your data and reducing lag
A VPN can be an extremely useful tool for gamers. Here's why you should consider gaming while using one.Nvidea's GeForce Now on a MacBook ProA Virtual Private Network (VPN) service offers many benefits for regular web-surfing purposes. Everything fro.....»»
What 2025 holds for user identity protection
In this Help Net Security video, David Cottingham, President of rf IDEAS, discusses what he sees as the most prominent areas for improvement and continued change in the space: As we move into 2025, it’s evident that businesses recognize MFA as esse.....»»
Bectran adds RSA encryption to protect the transmission of sensitive data
Keeping information secure is both a leading challenge and priority among B2B credit, collections and accounts receivables departments. It requires vigilance against scams like identity theft and hacks that intercept vital business and customer infor.....»»
Akamai App Platform reduces the complexity associated with managing Kubernetes clusters
Akamai announced the Akamai App Platform, a ready-to-run solution that makes it easy to deploy, manage, and scale highly distributed applications. The Akamai App Platform is built on top of the cloud native Kubernetes technology Otomi, which Akamai a.....»»
The changing face of identity security
It’s easy to see why identity security is often synonymous with user security. Social engineering tactics are the mainstay of the threat actor’s arsenal, and it’s rare to find an attack that doesn’t feature them to some degree. Getting hold o.....»»
Research shows gender, nationality enhance rivalry perceptions
When a competitor and opponent have a common identity that's relevant to a particular competition, it will increase their perception of rivalry and inspire them to try harder, according to new Cornell University research......»»
New greenhouse gas projections show Colorado moving in right direction to reduce pollution
Colorado is projected to fall short of its benchmarks for reducing greenhouse gas emissions in the next five years, but a new look at progress shows that, like a person trying to lose weight for a class reunion, the state has shaved off a few more po.....»»
California air regulators to vote on contentious climate program to cut emissions
California air regulators will vote Friday on changes to a key climate program aimed at reducing planet-warming emissions from transportation fuels that has a wide swath of critics—from environmentalists to the oil industry......»»
Australians who think inequality is high have less faith in democratic institutions, according to study
Central to Australia's cultural and political identity is the notion of a "fair go." But recent elections, including in the United States, have highlighted the challenge of maintaining shared norms and support for institutions when many voters don't.....»»
The high cost of complexity: New study explores energy needs of multicellular life
Between 1.8 billion and 800 million years ago, earthly life was in the doldrums. During this period, called the "boring billion," the complexity of life remained minimal, dominated by single-celled organisms with only sporadic ventures into multicell.....»»
Authlete 3.0 empowers organizations to improve how they issue and manage user credentials
Authlete launched Authlete 3.0, offering support for OpenID for Verifiable Credential Issuance (OID4VCI). This new capability empowers organizations—including governments, financial institutions, and educational establishments—to revolutionize ho.....»»
Firms that read more perform better: Researchers analyze online reading habits from employees across firms worldwide
By analyzing online reading behavior across millions of firms worldwide, a new study out of the Complexity Science Hub (CSH) connects how much information companies consume and how the consumption relates to their size......»»
Identity-related data breaches cost more than average incidents
Identity-related data breaches are more severe and costly than run-of-the-mill incidents, according to RSA. 40% of respondents reported an identity-related security breach. Of those, 66% reported it as a severe event that affected their organization......»»
Study finds 30% of regions worldwide achieve economic growth while reducing carbon emissions
More and more regions around the globe combine economic growth with reducing carbon emissions, researchers from the Potsdam Institute for Climate Impact Research and the University of Potsdam found......»»
The iPhone 16 Pro Max has an identity crisis
I love most of the iPhone 16 series, but there's one model I just don't understand: the iPhone 16 Pro Max......»»
AI learning mechanisms may lead to increase in codebase leaks
The proliferation of non-human identities and the complexity of modern application architectures has created significant security challenges, particularly in managing sensitive credentials, according to GitGuardian. Based on a survey of 1,000 IT deci.....»»
Dragon Age: The Veilguard’s best sidequest puts gender identity front and center
If you only have time to complete one companion quest in Dragon Age: The Veilguard, make sure its Taash's story......»»