Strata Identity collaborates with HYPR to help organizations adopt passwordless MFA
Strata Identity and HYPR announced a partnership that enables phishing-resistant MFA to be added to any modern, legacy, or custom application without rewriting the source code. This unique capability is made possible via an abstraction layer that dec.....»»
Common API security issues: From exposed secrets to unauthorized access
Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that many organizations are struggling with exposed secrets such as passwords and API keys, wh.....»»
Study confirms likely identity of the remains of Bishop Teodomiro
Until recently, little was known about Bishop Teodomiro, who, after St James the Apostle, is one of the most important figures associated with the pilgrimage to Santiago de Compostela......»»
Expert weighs in on gender identity and regulation in Olympic boxing
Olympic competition is meant to celebrate the best of the best—often serving as a career high point for elite athletes......»»
Critical Start helps organizations reduce cyber risk from vulnerabilities
Critical Start announced Critical Start Vulnerability Management Service (VMS) and Vulnerability Prioritization. These new offerings are a foundational pillar of Managed Cyber Risk Reduction, allowing organizations to assess, manage, prioritize, and.....»»
Authentik: Open-source identity provider
Authentik is an open-source identity provider designed for maximum flexibility and adaptability. It easily integrates into existing environments and supports new protocols. It’s a comprehensive solution for implementing features like sign-up, a.....»»
Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom
Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off by the victim organizations to not leak or sell the stolen data. “The attackers behind t.....»»
What you can do about the massive data breach that probably exposed all of your personal info
A recent data breach exposed sensitive information including social security numbers for billions of people globally, potentially leading to a significant increase in identity theft and cybercrimes. Here's what you need to know, and what you should d.....»»
Apple collaborates with Kim Kardashian on limited-edition Beats Studio Pro
Apple subsidiary Beats by Dre has collaborated with Kim Kardashian for a second time, with a trio of limited-edition Beats Studio Pro now available to purchase.Kim Kardashian with the limited-edition Beats Studio ProIn 2022, Beats worked with influen.....»»
The AI balancing act: Unlocking potential, dealing with security issues, complexity
The rapid integration of AI and GenAI technologies creates a complex mix of challenges and opportunities for organizations. While the potential benefits are clear, many companies struggle with AI literacy, cautious adoption, and the risks of immature.....»»
How passkeys eliminate password management headaches
In this Help Net Security interview, David Cottingham, President at rf IDEAS, discusses the key benefits organizations can expect when implementing passkeys. Cottingham addresses the misconceptions surrounding the adoption of passkeys, particularly i.....»»
74% of IT professionals worry AI tools will replace them
56% of security professionals are concerned about AI-powered threats, according to Pluralsight. Many organizations lack structured AI training Over half of surveyed technologists are either extremely concerned or moderately concerned about AI-powered.....»»
Teams forge communication shortcuts across large organizations to keep information flowing
When it comes to successful organizations, communication is key. But what does successful communication look like? A new study from North Carolina State University examines communication dynamics within a successful organization, uncovering the cruci.....»»
British Antarctic Survey publishes carbon emissions for 2023/2024
For the first time, the British Antarctic Survey (BAS) are publishing their carbon footprint data on their website to increase transparency and help other organizations reduce their carbon emissions......»»
International team discovers key protein that helps cells maintain their identity
A discovery regarding Mrc1 (Mediator of Replication Checkpoint 1)—a fission yeast protein involved in DNA replication—has been published in Cell. The discovery is the result of an international research collaboration, led by Professors Genevieve.....»»
Steps to improve quality engineering and system robustness
Major tech outages have recently impacted customers and operations at McDonald’s, Greggs, Deliveroo, Tesco, and Barclays. In this Help Net Security video, Stephen Johnson, CEO of Roq, says it is now imperative for companies and organizations to.....»»
74% of ransomware victims were attacked multiple times in a year
An alarming trend toward multiple, sometimes simultaneous cyber attacks forces business leaders to re-evaluate their cyber resilience strategies to address common points of failure, including inadequate identity system backup and recovery practices,.....»»
Forensic science cracks the "unsolvable" case of a World War I soldier"s identity, enabling his re-burial
In the early hours of July 18, 1918, the Franco-American counter-offensive against German positions began at Aisne-Marne in northern France. The first division of the American Expeditionary Force (AEF) drove the German forces back, but not without si.....»»
NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
The Network and Information Security (NIS) 2 Directive is possibly one of the most significant pieces of cybersecurity regulation to ever hit Europe. The 27 EU Member States have until 17 October 2024 to adopt and publish the standards necessary to c.....»»
Microsoft 365 anti-phishing alert “erased” with one simple trick
Attackers looking for a way into organizations using Microsoft 365 can make an alert identifying unsolicited (and thus potential phishing) emails “disappear”. “When an Outlook user receives an e-mail from an address they don’t typ.....»»
Veza introduces Access AI to streamline risk management and access control
Veza has released Access AI, a generative AI-powered solution to maintain the principle of least privilege at enterprise scale. With Access AI, security and identity teams can now use an AI-powered chat-like interface to understand who can take what.....»»