Cultivating sound email authentication systems

Ping Look, the executive advisor for security and awareness at Optiv, says assurance in the authenticity of received email is becoming more difficult. That’s because the sophistication of spoofed e-mail is on the rise. Motivations of senders of malicious e-mail are also becoming more varied. Read the interview with Ping Look, the executive advisor for security […]

How Google’s Physical Keys Will Protect Your Password

Read Brian X. Chen and Nicole Perlroth explain how Google’s new physical keys will help you protect your password on NY Times : Why won’t the password just go away? The silly pet names, movie titles or sports teams that many people punch in to get into their online accounts are a weak spot that […]

Strong Authentication Still Elusive for Businesses

Businesses are continuing to rely on passwords, and those that are implementing additional authentication factors are choosing outdated options like static questions and SMS codes that leave them vulnerable to data breaches. Read more about the  Javelin Strategy & Research’s 2017 State of Authentication Report which reveals that only half of all respondents still use […]

iPhone X gets facial authentication, is the enterprise next?

Read why Ryan Zlockie says that enterprises can use iPhone X’s facial authentication on Help Net Security : This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on face recognition in order to check email, […]

Deloitte breach underlines need for better authentication

Cyber attackers have reportedly compromised Deloitte’s global email server through an administrator’s account, giving them unrestricted access to emails and attachments. Read why the hack attack on Deloitte’s global email servers hold lessons for businesses to have proper authentication management system in place on Computer Weekly.

The age of hacking brings a return to the physical key

Read Jungwoo Ryoo’s article about how physical key now makes a return due to growing hacking attacks on GCN : With all the news about Yahoo accounts being hacked and other breaches of digital security, it’s easy to wonder if there’s any real way to keep unauthorized users out of our email and social media […]

FIDO Standards Could Complement Government’s Existing Digital Security Protocols

The FIDO Alliance is hoping that the Trump administration will heed its advice in a new white paper outlining how FIDO standards could complement existing digital security protocols in use by the government. It’s a response to last December’s report from the US Commission on Enhancing National Cybersecurity, which advocated for stronger authentication methods beyond the […]

Impediments to Adoption of Two-factor Authentication by Home End-Users

Cyber criminals have proven to be both capable and motivated to profit from compromised personal information. The FBI has reported that victims have suffered over $3 billion in losses through compromise of email accounts alone (IC3 2016). One security measure which has been demonstrated to be effective against many of these attacks is two-factor authentication […]

Multi-Factor Authentication Sees Huge 40% Jump in 2016

According to a survey from SecureAuth Corp., in 2015, 66% of organizations were using MFA in some capacity. In 2016, that number has jumped to an impressive 93%. More than half (51%) are using MFA across the organization, while 38% have implemented it in some areas. Read about the new surveys by SecureAuth Corp which reveals […]

Multi-factor authentication is ‘the solution’ to hacking, says Darkmatter

Interconnectivity – be it with respect to digital networks in general or banking systems – needs to take into consideration the cascading effects of a breach and mitigate against them. Given that the latest incident in Russia was likely orchestrated using falsified client credentials, which has become a preferred method of bank system hacking. Read […]