SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Digital Credentials news stories

Story image
HID
Creating a secure and welcoming environment with automated visitor management
How can organisations create safe working environments that people actually want to visit?
Story image
Compliance
CredShare announces successful capital raising and next-gen RegTech
Australian start-up CredShare has announced it's raised a further circa $2.7 million while unveiling the next evolution of its credentials platform. 
Story image
Compliance
Aussie startup CredShare hits $14m in funding, prepares to launch
“We are not just another RegTech creating compliance forms, and software that ticks a box. We are passionate about building a solution that will genuinely improve your information security."
Story image
Yubico
What should be Australia’s public sector response to strengthening online security?
Government employees and contractors are prime targets for cyber-attacks because of the information they have access to.
Story image
Cybersecurity
How credentials became an attacker’s easiest target
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Story image
Cybersecurity
A surge in digital identities creating critical obstacles for businesses
One Identity has released survey findings revealing a significant increase in digital identities globally. 
Story image
Digital Credentials
Countering the rise of credential-based attacks
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
Story image
Digital Credentials
Attivo Networks launches credential-cloaking tool to deter data thieves
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
Story image
Phishing
Thousands of stolen credentials end up on the internet by careless phishing scammers
"Anyone could have had access to the information stolen," says Check Point.
Story image
Cybersecurity
How a vantage point sees threats before they impact
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.
Story image
Remote Working
Remote workers need to up their game to keep organisations secure
According to the study, employees' habits, including password re-use and letting family members use corporate devices, are putting critical business systems and sensitive data at risk.
Story image
Blockchain
Hyland snaps up blockchain credentialing firm Learning Machine
“This acquisition is a major step toward our goal of revolutionising the way organisations electronically exchange trusted records,” says Hyland president and CEO Bill Priemer.
Story image
Physical Security
Credentials install base set to hit 11 billion by 2023
The number of smart card shipments is forecast to increase from 618.8 million in 2018 to 732.7 million in 2023, according to ABI Research.
Story image
Cybersecurity
Credential theft industry booming in US, declining in Asia & EU
New research reveals the US is ripe for harvest, but Blueliv says the declines in EU and Asia are almost definitely only temporary.
Story image
Cybersecurity
ISACA adds credentials for cybersecurity audits
The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits.
Story image
Identity and Access Management
Access management employees will thank you for – Seos has you covered
Seos can be ported onto microprocessor devices, allowing the credential system to be delivered on mobile devices, wearables, and smart cards.
Story image
LinkedIn
Singapore firm embraces blockchain to fight credential fraud
A Singapore tech firm is using blockchain technology to bring validation and authentication to CVs and other credential types.
Story image
Phishing
Credential theft is the hottest trend for cyber attackers in Q2
This year cyber attackers have narrowed their focus to methods that involve credential theft, be it through malware, phishing or brute force attacks.
Story image
Hackers
Javelin Networks: Give up on honeypots, because attackers will outsmart them
Honey tokens, which are honeypots that are not computers, are easily studied and avoided by the average attacker.
Story image
Passwords
Poor password choices make it easy for credential stuffing attacks, Digital Shadows warns
“Enterprises - and the companies that work for and with them - need to be better prepared for this sort of brute force attack."
Story image
The University of Auckland
Digital university credentials enhance student mobility
"My eQuals will enhance student mobility & streamline processes for employers and others who will be able to verify the authenticity of credentials."