Implementing trusted digital IDs will create benefits for end users as well as service providers, says Nick Mothershaw, chair and executive director at the Open Identity Exchange. But widespread international adoption of such IDs will take time to achieve, he acknowledges.
Many ethical hackers and other security professionals, such as penetration testers, have weaponized cloud platforms to host online attack infrastructure or have used the platforms to conduct reconnaissance, according security researchers at Texas Tech University.
An attacker's most efficient approach to a pay day is to land on a host and then 'live off the land' using the residue of errant credentials and connections left behind from the course of daily operations-cached domain admin credentials, disconnected RDP sessions, local admin accounts using the same password, and...
Consumers hate passwords, criminals love them. Most organizations today have an initiative to replace passwords with a modern approach that is both more convenient, and more secure. Completely eliminating password authentication across any channel and any device is a journey that takes time. Like major global...
Cloud computing offers organisations the ability to develop new technologies in less time, with a lower barrier to entry. As security leaders in government and regulated non-government enterprises migrate to public, private or hybrid cloud, they require strong security to prevent data breaches, protect sensitive...
Identity and access management shouldn't feel like a catch-22. On the one hand, you want to allow employees to work as they need to, which is often on the road or at home, not at the office. On the other hand, not a day goes by without security breaches making headline news. And you don't want to be that headline....
The Internet of Things (IoT) is opening up new opportunities for businesses and consumers, and is the linchpin of almost every digital transformation initiative. However, IoT also presents considerable security risks and challenges for organisations, specifically attackers impersonating a trusted device could conduct...
With 82 per cent of CISOs feeling burnt out, what's going on in the cyber industry to cause this? And what can be done to stop CISO burnout? The Cybersecurity special report, published in The Times, explores the cybersecurity industry from C-suite roles to cyber threats while working from home. It looks at the...
Identity is you. Identity is the behaviour, devices, access, and attributes that are unique to you as an individual in the workplace. But identity is complex. Every employee has their own identity, so every identity needs to be properly managed. Otherwise, the wrong users can access the wrong apps and resources,...
Even after being notified that their personal data has been compromised in a breach, only about a third of users change their passwords - and most are not strong or unique, according to a study by researchers at Carnegie Mellon University, who call for changes in breach notification procedures.
The massive shift to remote working as a result of the COVID-19 pandemic means more organizations are adopting the "zero trust" model, taking such steps as implementing proper access controls, monitoring user behavior and building data governance policies.
Bil Harmer, CISO and Chief Evangelist at SecureAuth and Dan Dunstedter, Data Security/HIPAA Security Officer of Phelps Health, discuss why security teams need to increase the level of protection used to secure valuable and highly sensitive information and how they have implemented the highest level of authentication...
Security experts and law enforcement officials have long argued that paying ransoms doesn't pay. For starters, it directly funds the cybercrime ecosystem and makes it attractive for criminals to keep launching ransomware attacks.
As e-commerce explodes during the global CIVD-19 pandemic, transaction authentication is more critical for fraud prevention, says Phil Dunkelberger of Nok Nok Labs, who discusses the latest fraud trends.
Important criteria to consider when choosing an IAM vendor
Adopting multi-factor authentication prevents the most common attacks on corporate networks.
Advanced authentication goes a step further toward the higher security and greater convenience of a passwordless environment.
As organizations move to adopt...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.