authentication

Password crisis in healthcare: Meeting and exceeding HIPAA requirements

Password crisis in healthcare: Meeting and exceeding HIPAA requirements 2025-08-20 at 19:25 By Help Net Security In 2025, healthcare organizations are facing a new wave of password security risks. Recent data from the HIMSS Cybersecurity Survey reveals that 74% experienced at least one significant security incident over the last year. More than half of responders […]

React to this headline:

Loading spinner

Password crisis in healthcare: Meeting and exceeding HIPAA requirements Read More »

New NIST guide explains how to detect morphed images

New NIST guide explains how to detect morphed images 2025-08-18 at 18:00 By Sinisa Markovic Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks at buildings, airports, borders, and other secure places. These morphed images can trick face recognition systems into linking the photo

React to this headline:

Loading spinner

New NIST guide explains how to detect morphed images Read More »

NIST finalizes lightweight cryptography standard for small devices

NIST finalizes lightweight cryptography standard for small devices 2025-08-13 at 17:24 By Anamarija Pogorelec The National Institute of Standards and Technology (NIST) has finalized a lightweight cryptography standard to protect even the smallest networked devices from cyberattacks. Published as Ascon-Based Lightweight Cryptography Standards for Constrained Devices (NIST Special Publication 800-232), the standard offers tools for

React to this headline:

Loading spinner

NIST finalizes lightweight cryptography standard for small devices Read More »

1Kosmos Raises $57 Million for Identity Verification and Authentication Platform

1Kosmos Raises $57 Million for Identity Verification and Authentication Platform 2025-08-12 at 16:11 By Eduard Kovacs 1Kosmos has raised $57 million in Series B funding, which brings the total raised by the company to $72 million. The post 1Kosmos Raises $57 Million for Identity Verification and Authentication Platform appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

1Kosmos Raises $57 Million for Identity Verification and Authentication Platform Read More »

From legacy to SaaS: Why complexity is the enemy of enterprise security

From legacy to SaaS: Why complexity is the enemy of enterprise security 2025-08-11 at 08:32 By Mirko Zorz In this Help Net Security interview, Robert Buljevic, Technology Consultant at Bridge IT, discusses how the coexistence of legacy systems and SaaS applications is changing the way organizations approach security. He explains why finding the right balance

React to this headline:

Loading spinner

From legacy to SaaS: Why complexity is the enemy of enterprise security Read More »

Fighting AI with AI: How Darwinium is reshaping fraud defense

Fighting AI with AI: How Darwinium is reshaping fraud defense 2025-07-29 at 16:07 By Mirko Zorz AI agents are showing up in more parts of the customer journey, from product discovery to checkout. And fraudsters are also putting them to work, often with alarming success. In response, cyberfraud prevention leader Darwinium is launching two AI-powered

React to this headline:

Loading spinner

Fighting AI with AI: How Darwinium is reshaping fraud defense Read More »

Review: Passwork 7.0, self-hosted password manager for business

Review: Passwork 7.0, self-hosted password manager for business 2025-07-17 at 13:09 By Help Net Security Over the years, the number of services we use has exploded, and so has the need to protect our credentials. Back in what I like to call “the age of innocence,” we scribbled passwords on paper or reused “password123” across

React to this headline:

Loading spinner

Review: Passwork 7.0, self-hosted password manager for business Read More »

Why silent authentication is the smarter way to secure BYOD

Why silent authentication is the smarter way to secure BYOD 2025-07-17 at 09:08 By Help Net Security In this Help Net Security video, Andy Ulrich, CISO at Vonage, explains how silent authentication offers a smarter, seamless solution to the security and productivity challenges of BYOD. He breaks down how it works, why it matters, and

React to this headline:

Loading spinner

Why silent authentication is the smarter way to secure BYOD Read More »

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech 2025-07-15 at 09:00 By Mirko Zorz For decades, manufacturers and security professionals have been playing a high-stakes game of cat and mouse with counterfeiters. From holograms and QR codes to RFID tags and serial numbers, the industry’s toolkit has evolved, but so have the

React to this headline:

Loading spinner

Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech Read More »

Aegis Authenticator: Free, open-source 2FA app for Android

Aegis Authenticator: Free, open-source 2FA app for Android 2025-07-07 at 08:34 By Help Net Security Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The app features strong encryption and the ability to back up your data. It supports both HOTP and TOTP, so it

React to this headline:

Loading spinner

Aegis Authenticator: Free, open-source 2FA app for Android Read More »

NTLM relay attacks are back from the dead

NTLM relay attacks are back from the dead 2025-07-04 at 09:32 By Help Net Security NTLM relay attacks are the easiest way for an attacker to compromise domain-joined hosts. While many security practitioners think NTLM relay is a solved problem, it is not – and, in fact, it may be getting worse. Anecdotally, they are

React to this headline:

Loading spinner

NTLM relay attacks are back from the dead Read More »

ClickFix attacks skyrocketing more than 500%

ClickFix attacks skyrocketing more than 500% 2025-06-26 at 12:02 By Sinisa Markovic ClickFix, a deceptive attack method, saw a surge of more than 500% in the first half of 2025, making it the second most common attack vector after phishing, according to ESET’s latest Threat Report. The report, which looks at trends from December 2024

React to this headline:

Loading spinner

ClickFix attacks skyrocketing more than 500% Read More »

Why should companies or organizations convert to FIDO security keys?

Why should companies or organizations convert to FIDO security keys? 2025-06-25 at 08:09 By Mirko Zorz In this Help Net Security interview, Alexander Summerer, Head of Authentication at Swissbit, explains how FIDO security keys work, what threats they address, and why they’re gaining traction across industries, from healthcare to critical infrastructure. He also shares insights

React to this headline:

Loading spinner

Why should companies or organizations convert to FIDO security keys? Read More »

Strategies to secure long-life IoT devices

Strategies to secure long-life IoT devices 2025-06-20 at 09:07 By Mirko Zorz In this Help Net Security interview, Rob ter Linden, CISO at Signify, discusses priorities for CISOs working on IoT security, including the need for compliant infrastructure, easy device management, and preparing for future tech like quantum computing and AI. He also covers challenges

React to this headline:

Loading spinner

Strategies to secure long-life IoT devices Read More »

Balancing cybersecurity and client experience for high-net-worth clients

Balancing cybersecurity and client experience for high-net-worth clients 2025-06-09 at 09:03 By Mirko Zorz In this Help Net Security interview, Renana Friedlich-Barsky, EVP and CISO at LPL Financial, discusses how threat actors are targeting high-net-worth clients and exploiting digital touchpoints in wealth management. She explains why firms must embed security from the start to protect

React to this headline:

Loading spinner

Balancing cybersecurity and client experience for high-net-worth clients Read More »

Product showcase: Secure digital and physical access with the Swissbit iShield Key 2

Product showcase: Secure digital and physical access with the Swissbit iShield Key 2 2025-05-20 at 16:16 By Help Net Security To meet today’s complex security requirements, organizations need solutions that are not only secure, but also practical and scalable. The Swissbit iShield Key 2 offers a compelling answer by combining two critical security functions –

React to this headline:

Loading spinner

Product showcase: Secure digital and physical access with the Swissbit iShield Key 2 Read More »

Hanko: Open-source authentication and user management

Hanko: Open-source authentication and user management 2025-05-19 at 07:32 By Mirko Zorz Hanko is an open-source, API-first authentication solution purpose-built for the passwordless era. “We focus on helping developers and organizations modernize their authentication flows by migrating users towards passkeys, while still supporting all common authentication methods like email/password, MFA, OAuth, as well as SAML

React to this headline:

Loading spinner

Hanko: Open-source authentication and user management Read More »

Microsoft Accounts Go Passwordless by Default

Microsoft Accounts Go Passwordless by Default 2025-05-02 at 12:32 By Ionut Arghire Microsoft is prioritizing passwordless sign-in and sign-up methods, and is making new accounts passwordless by default. The post Microsoft Accounts Go Passwordless by Default appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Microsoft Accounts Go Passwordless by Default Read More »

What’s worth automating in cyber hygiene, and what’s not

What’s worth automating in cyber hygiene, and what’s not 2025-04-29 at 09:05 By Mirko Zorz Cyber hygiene sounds simple. Patch your systems, remove old accounts, update your software. But for large organizations, this gets messy fast. Systems number in the thousands. Teams are scattered. Some machines haven’t been rebooted in months. Automation can help. But

React to this headline:

Loading spinner

What’s worth automating in cyber hygiene, and what’s not Read More »

Scroll to Top