New Zealand's leading source of cybersecurity and threat news
Multi-factor authentication / MFA
These search results are from across the Techday network of sites
Yubico to provide hardware security key with Okta’s MFA
YubiKeys, hardware-based protection in the form of physical devices, provide an option for a second factor in Okta MFA.
Exclusive interview: Major MFA vulnerability discovered in Microsoft’s ADFS
This exploit gives an actor an incredible advantage to expand compromises significantly.
GitHub security tool checks passwords against 517m breached credentials
Web development and coding platform GitHub has rolled out password and two-factor authentication revamps to make user accounts more secure.
User passwords and email addresses compromised in Reddit breach
Its primary access points for code and infrastructure had required two-factor authentication via SMS, and the main attack intercepted the text.
Time capsule app TimeHop breached, 21 million users affected
The breach occurred as an access credential to TimeHop’s cloud computing environment that didn't have multifactor authentication was compromised.
Ransomware: Top-of-mind for Aussies, but we just don't know what to do about it
Ransomware continues to be a major concern for Australian consumers this year - and many are unsure if they have even been affected by it.
Exclusive interview: Okta CSO on skill shortages, passwordless authentication, and UX
The tension between security and user experience is one IT practitioners have had to grapple with as businesses become more vulnerable to breaches.
Interview: Twizo explains why the 2FA revolution isn’t quite here – but it is coming
“Cybersecurity is a problem we all face but 2FA is offered by a lot of service providers in either a too complicated or too unclear of a way."
Biometrics: Adding the human touch to cybersecurity
Biometric security is no longer confined to sci-fi movies like Star Trek or spy films such as the Kingsman and James Bond series.
Passwords: They're as useless as the 'g' in lasagna
Accounts were compromised because he re-used the password “dadada”. Six characters, all lowercase. If anyone should know better, it’s Zuckerberg.
Google rolls out phishing prevention amongst new G Suite security features
Updates include phishing prevention, mobile device management, security keys for two-factor authentication, Information Rights Management, and more.
Why a secure perimeter is no longer enough protection for your IT infrastructure
Digital identity is used as the key method of protecting digital assets regardless of their location or how they are being accessed.
Interview: Unravelling the myths of chatbot security and identity theft in banking
“People shouldn’t be worried about internet banking. They should be worried about what information they’re giving people who can impersonate them.
25% of firms fail to implement multi-factor authentication for BYOD
25% of respondents at the Gartner Symposium lacked some form of multi-factor authentication when securing BYOD.
Fujitsu rolls out Biometrics-as-a-Service to Australian enterprises
Fujitsu's cloud-based multimodal biometrics-as-a-service solution will enable Australian organisations to deploy biometric authentication.
Okta report says security is changing workplace app use
Okta's 2018 Businesses @ Work report, which found that seven of the 15 fastest-growing apps are security tools or have security use cases.
NTT-AT & Trusona partner to deliver NoPasswords solution in Japan
NTT Advanced Technology is now partnering with identity authentication provider Trusona to bring multi-factor authentication to customers in Japan.
IoT, cryptocurrency, Linux & WiFi hacks: WatchGuard's security predictions for 2018
WatchGuard Technologies has whipped up some key IT security predictions ranging from IoT botnets to Linux attacks.
RSA expands authentication footprint with four major security firms
RSA has announced authentication partnerships with the likes of CyberArk, Microsoft, Palo Alto Networks and VMware.
The importance of two-factor authentication in banking & business
"If an attacker knows your password, they won’t necessarily be able to steal your money. It’s like having a second lock for your door."
How the future will blur the lines of authentication & identity management
According to Verizon’s 2017 Data Breach Investigation Report, 81% of hacking-related breaches leveraged stolen or weak passwords.
1 in 4 organisations relying solely on passwords to secure BYOD
Bitglass has released the findings from its newest research, ‘BYOD and Identity’, which are alarming to say the least.
Singapore firm Ammbr teams with US security token provider to expand blockchain
"Our mission at Rivetz is to improve security at the device level, and we're happy to be partnering with Ammbr to support stronger protection."
Exclusive: ESET on why the humble password is here to stay
"So how long is ‘really long’? I recommend a minimum of twelve characters with mixed-cases and numbers or symbols. Even longer is better."