authentication

Why you need to extend enterprise IT security to the mainframe

Why you need to extend enterprise IT security to the mainframe 2023-12-29 at 07:32 By Help Net Security Organizations with mainframes face a unique challenge: extending consistency across the entire enterprise, including mainframe environments. The ongoing issue lies in the incompatibility of tools designed for both mainframes and enterprise settings, resulting in disparate solutions, training […]

React to this headline:

Loading spinner

Why you need to extend enterprise IT security to the mainframe Read More »

3 main tactics attackers use to bypass MFA

3 main tactics attackers use to bypass MFA 2023-12-26 at 07:09 By Help Net Security Notable security breaches have bypassed MFA to compromise taxi broker Uber, games company EA, and authentication business Okta, according to SE Labs. CISOs must bolster MFA protections SE Labs advised CISOs to step-up their efforts against attacks on systems protected

React to this headline:

Loading spinner

3 main tactics attackers use to bypass MFA Read More »

A closer look at LATMA, the open-source lateral movement detection tool

A closer look at LATMA, the open-source lateral movement detection tool 13/12/2023 at 08:01 By Help Net Security In this Help Net Security video, Gal Sadeh, Head of Data and Security Research at Silverfort, discusses LATMA, a free, open-source tool. It’s engineered with advanced algorithms to track and report any unusual activity within an environment.

React to this headline:

Loading spinner

A closer look at LATMA, the open-source lateral movement detection tool Read More »

Many popular websites still cling to password creation policies from 1985

Many popular websites still cling to password creation policies from 1985 12/12/2023 at 09:01 By Helga Labus A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute of Technology have found. Websites’ lax creation policies for passwords The researchers used an automated account creation method

React to this headline:

Loading spinner

Many popular websites still cling to password creation policies from 1985 Read More »

eIDAS: EU’s internet reforms will undermine a decade of advances in online security

eIDAS: EU’s internet reforms will undermine a decade of advances in online security 12/12/2023 at 08:32 By Help Net Security The European Union’s attempt to reform its electronic identification and trust services – a package of laws better known as eIDAS 2.0 – contains legislation that poses a grave threat to online privacy and security.

React to this headline:

Loading spinner

eIDAS: EU’s internet reforms will undermine a decade of advances in online security Read More »

Short-term AWS access tokens allow attackers to linger for a longer while

Short-term AWS access tokens allow attackers to linger for a longer while 07/12/2023 at 17:32 By Zeljka Zorz Attackers usually gain access to an organization’s cloud assets by leveraging compromised user access tokens obtained via phishing, by using malware, or by finding them in public code repositories. These are long-term access tokens associated with an

React to this headline:

Loading spinner

Short-term AWS access tokens allow attackers to linger for a longer while Read More »

Keyless Goes Independent, Raises $6M for Biometric Authentication

Keyless Goes Independent, Raises $6M for Biometric Authentication 29/11/2023 at 19:01 By Ryan Naraine British startup building biometric authentication technology has snagged $6 million in a new round of funding led by Rialto Ventures. The post Keyless Goes Independent, Raises $6M for Biometric Authentication appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Keyless Goes Independent, Raises $6M for Biometric Authentication Read More »

Okta breach: Hackers stole info on ALL customer support users

Okta breach: Hackers stole info on ALL customer support users 29/11/2023 at 14:16 By Zeljka Zorz The scope of the recent breach of the Okta customer support system is much wider than initially established, the company has admitted on Tuesday: the attackers downloaded a report that contained the names and email addresses of all Okta

React to this headline:

Loading spinner

Okta breach: Hackers stole info on ALL customer support users Read More »

Strategies for cultivating a supportive culture in zero-trust adoption

Strategies for cultivating a supportive culture in zero-trust adoption 29/11/2023 at 08:01 By Mirko Zorz In this Help Net Security interview, Wolfgang Goerlich, Advisory CISO at Cisco, discusses the benefits of implementing a mature zero-trust model for both security and business outcomes, revealing a decrease in reported security incidents and enhanced adaptability. Goerlich emphasizes the

React to this headline:

Loading spinner

Strategies for cultivating a supportive culture in zero-trust adoption Read More »

How passkeys are reshaping user security and convenience

How passkeys are reshaping user security and convenience 28/11/2023 at 08:34 By Mirko Zorz In this Help Net Security interview, Anna Pobletts, Head of Passwordless at 1Password, talks about passkey adoption and its acceleration in 2024. This trend is particularly notable among highly-regulated services like fintech and banking, where users seek a sign-in experience that

React to this headline:

Loading spinner

How passkeys are reshaping user security and convenience Read More »

The new imperative in API security strategy

The new imperative in API security strategy 16/11/2023 at 07:01 By Help Net Security Of the 239 vulnerabilities, 33% (79 out of 239) were associated with authentication, authorization and access control (AAA) — foundational pillars of API security, according to Wallarm. Prioritizing AAA principles Open authentication (OAuth), single-sign on (SSO) and JSON Web Token (JWT),

React to this headline:

Loading spinner

The new imperative in API security strategy Read More »

How global password practices are changing

How global password practices are changing 06/11/2023 at 09:33 By Help Net Security Password health and hygiene improved globally over the past year, reducing the risk of account takeover for consumers and businesses, according to Dashlane. Password reuse remains prevalent, however, leaving user accounts particularly vulnerable to password-spraying attacks if they’re not protected by strong

React to this headline:

Loading spinner

How global password practices are changing Read More »

A closer look at healthcare’s battle with AI-driven attacks

A closer look at healthcare’s battle with AI-driven attacks 31/10/2023 at 08:02 By Mirko Zorz With its wealth of sensitive patient data, the healthcare industry has become a prime target for cybercriminals leveraging AI tools. As these threats continue to evolve, it’s important to understand how AI is shaping the cybercrime landscape in healthcare and

React to this headline:

Loading spinner

A closer look at healthcare’s battle with AI-driven attacks Read More »

The dangers of dual ransomware attacks

The dangers of dual ransomware attacks 30/10/2023 at 09:32 By Help Net Security At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await companies that fall victim to ransomware and fail

React to this headline:

Loading spinner

The dangers of dual ransomware attacks Read More »

1Password also affected by Okta Support System breach

1Password also affected by Okta Support System breach 24/10/2023 at 13:50 By Zeljka Zorz Following in the footsteps of BeyondTrust and CloudFlare, 1Password has revealed that it has been affected by the Okta Support System breach. “On September 29, we detected suspicious activity on our Okta instance that we use to manage our employee-facing apps,”

React to this headline:

Loading spinner

1Password also affected by Okta Support System breach Read More »

How passkeys are changing the face of authentication

How passkeys are changing the face of authentication 23/10/2023 at 08:05 By Help Net Security As passwordless identity becomes mainstream, the term “passkey” is quickly becoming a new buzzword in cybersecurity. But what exactly is a passkey and why do we need them? A passkey is a digital credential that can only be used by

React to this headline:

Loading spinner

How passkeys are changing the face of authentication Read More »

Legacy authentication leads to growing consumer frustration

Legacy authentication leads to growing consumer frustration 20/10/2023 at 07:31 By Help Net Security Despite widespread usage of passwords lingering on, consumers want to use stronger, more user-friendly alternatives, according to FIDO Alliance. Entering a password manually without any form of additional authentication was the most commonly used authentication method across the use cases tracked

React to this headline:

Loading spinner

Legacy authentication leads to growing consumer frustration Read More »

Valve introduces SMS-based confirmation to prevent malicious games on Steam

Valve introduces SMS-based confirmation to prevent malicious games on Steam 17/10/2023 at 16:32 By Helga Labus Video game publisher/digital distribution company Valve is forcing developers who publish games on its Steam platform to “validate” new builds with a confirmation code received via SMS. The Steam SMS confirmation requirement Valve sent out notices last month to

React to this headline:

Loading spinner

Valve introduces SMS-based confirmation to prevent malicious games on Steam Read More »

Anticipating the benefits of a passwordless tomorrow

Anticipating the benefits of a passwordless tomorrow 17/10/2023 at 06:02 By Help Net Security Businesses are actively moving to eradicate passwords from employees’ lives, with 89% of IT leaders expecting passwords to represent less than a quarter of their organization’s logins within five years or less, according to a FIDO Alliance and LastPass report. Moving

React to this headline:

Loading spinner

Anticipating the benefits of a passwordless tomorrow Read More »

Microsoft Improving Windows Authentication, Disabling NTLM

Microsoft Improving Windows Authentication, Disabling NTLM 16/10/2023 at 15:33 By Ionut Arghire Microsoft is adding new features to the Kerberos protocol, to eliminate the use of NTLM for Windows authentication. The post Microsoft Improving Windows Authentication, Disabling NTLM appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Microsoft Improving Windows Authentication, Disabling NTLM Read More »

Scroll to Top