Multi-factor authentication / MFA stories - Page 2
Ping’s significant expansion of its cloud identity solution
PingOne for Customers adds new features designed to create seamless and secure user experiences.
LogMeIn expands cloud identity capabilities with new offerings
Many small and medium-sized companies don’t have the resources to implement robust security programs.
Ping Identity offerings accelerates cloud MFA and SSO adoption
90% of respondents trust MFA as an effective security control to protect identity data in public clouds, yet only 60% of organisations have formally adopted it.
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
NDB report: Stronger authentication practices needed
The Australian Information Commissioner (OIAC) has released the latest quarterly report on the notifications under the Notifiable Data Breaches scheme.
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Okta launches risk-based authentication with machine learning
The new feature will allow enterprises to automate security by implementing significantly stronger authentication techniques and remediation when the scenario calls for it.
Okta brings centralised identity security to servers
“Server access has traditionally relied on shared credentials that may never change, and that creates significant vulnerabilities for large or growing organisations.”
Opinion: BYOD can be secure with the right measures
Companies that embrace BYOD are giving employees more freedom to work remotely, resulting in increased productivity, cost savings, and talent retention.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CSOs - are you prepared for cloud cryptojacking?
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Security and mobility app adoption increasing - Okta
The fastest-of-the-fastest growing apps focus on identity-driven security, indicating that companies are taking Zero Trust seriously.
Expert comment: What the Collection #2-5 data dump means for credential abuse
Techday spoke to experts and executives in the security industry about the data leak and the implications on phishing and credential stuffing.
Massive 2.2bil-username data dump leaked on dark web
This makes the second leak three times bigger than the Collection #1 dump leaked last month.
Ping Identity CTO’s cybersecurity predictions for 2019
“Our borderless world provides unprecedented freedom and convenience, but also breeds a whole new set of cybersecurity risks and concerns.”
2019: The year attackers steal faces - Forcepoint
While passwords may change, physical biometrics are genetic and specific to each person.
Exclusive: Three access management learnings from 2018
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
Hands-on review: Quick and easy authentication with YubiKeys
Consumers tend to believe that setting up two-factor authentication puts them at the height of cybersecurity best practice – but this belief is misled.
Ping Identity announces new Identity-as-a-Service solution
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.
Check Point announces general availability for CloudGuard SaaS
CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email.
Exclusive: Securing cloud data in the APAC environment
The majority of users are unable to develop good cyber hygiene in line with the rapid rate of digitalisation that the APAC region is undergoing.
Interview: Building secure apps from the ground up
Security should be a key consideration from the initial design phase before any build even begins.