Successful account takeovers are one of the most common ways that organizations end up with attackers in their systems. But strong authentication can thwart even the most clever phishing campaigns, says Brett Winterford, regional chief security officer for APJ at Okta.
The divide between mobile app detection and IAM has fueled cyber incidents and breaches as remote work has expanded. Workers using personal smartphones don't want to install corporate endpoint management products but still need to ensure both user and device are protected, says RSA CEO Rohit Ghai.
In the wake of President Biden's 2021 executive order, security leaders across sectors are now seeking phishing-resistant multifactor authentication. But what exactly is it, and how is it best deployed? Yubico's Derek Hanson outlines a mature approach to MFA.
In this video interview with Information Security Media...
“MFA blocks 99% of attacks” until it doesn’t. An outdated MFA is a clear and present danger. In this webinar with Roger Grimes, author of “Hacking Multifactor Authentication”, we’ll enumerate the multiple vulnerabilities with existing “phishable” MFA; and the TTP’s hackers are employing to bypass the...
In Part 3 of a three-part video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, describe the operational and business benefits of creating an identity strategy.
Security & ease of use: It is one thing for non-healthcare entities to debate these merits of new authentication in solutions. But in healthcare, where the decisions directly impact patient safety, the stakes are critical. Tom Scontras of Yubico talks about how healthcare approaches authentication.
It's no secret: As pharmaceutical companies develop new health treatments, adversaries seek to steal or sabotage their intellectual property. This dynamic adds extra urgency to authentication. Tom Scontras of Yubico talks about how the pharma sector approaches authentication.
In the latest weekly update, ISMG editors discuss the implications of the former Uber CSO's guilty verdict for the rest of the industry, the growing problem of keyless car theft, and the latest progress toward a passwordless future revealed at the annual FIDO Alliance conference.
Organizations can improve security with modern authentication protocols, but the big message to the marketplace is that FIDO Passkeys give customers more convenience and deliver a consistent user experience, according to panelists on the final day of FIDO Alliance's Authenticate 2022 Conference.
In Part 2 of this video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, explain why organizations need to think about identities in the context of humans and nonhumans, their roles and their risks.
Multifactor authentication needs to move away from one-time passwords sent via text message and embrace modern standards that prevent man-in-the-middle attacks. Plus, excessive identity challenges online lead to 20% of e-commerce transactions being abandoned, say experts at Authenticate 2022.
Multifactor authentication should be the default, not an option, says U.S. Cybersecurity and Infrastructure Security Agency Director Jen Easterly. She told an industry conference that vendors should "forcefully nudge" users into MFA and offer a more complete feature set for users who want it.
Multifactor authentication was supposed to be the standard, but the sharp rise in highly successful MFA bypass attacks shows the industry needs to go further in verifying identities. Keynote speakers at Authenticate 2022 said the future of passwordless technology could answer this latest threat.
Year after year, cybersecurity researchers report that
compromised user credentials are the cause of more
than 80% of data breaches and ransomware losses.
Your organization needs an innovative and effective way to keep
hackers out of any network.
Download here to garner insights into a multi-factor...
The latest ISMG Security Report examines whether banks should be held liable for the rapidly increasing Zelle fraud problem, explores the latest M&A activity among IAM vendors, and discusses the implications of the new legal framework for personal data transfers between the U.S. and Europe.