SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Multi-factor authentication / MFA news stories - Page 2

Story image
VPN
Why cybersecurity and employee experience go hand-in-hand
Each individual represents an access point into the network, and one compromised user can result in a cascade of ramifications with long-lasting consequences.
Story image
Cloud Security
The 5 most common multi-factor authentication (MFA) methods
While MFA is ubiquitous, it’s far from perfect – whether you’re the business or the end-user. Here are the 5 most common MFA methods, and where each of them falls short. 
Story image
Cybersecurity
The real reason to use risk-based authentication in the enterprise
By analysing what the user knows, has, and does, the risk engine can identify legitimate users while denying access to intruders.
Story image
Cybersecurity
Security experts underscore identity assurance in post-lockdown era
Organisations should rebuild, re-prioritise and re-assess their current security programs, with the ultimate goal of enhancing threat response. 
Story image
Cloud
Arrow to distribute SecureAuth identity security
The technology provides a solution for public and private sectors delivering secure access to systems, applications, and data.
Story image
Passwords
Interview: Yubico A/NZ vice president on passwords in the modern world
"With open authentication standards, like WebAuthn and FIDO2, a passwordless future is attainable."
Story image
Cybersecurity
Six practical tips for better password practice
rsenal, Star Wars and Eminem all featured in the top 300 most hacked passwords last year.
Story image
LastPass
Three ways to protect your business in the cloud
A modern BYO-anything workforce means more access points, hidden apps and hurdles to secure across the organisation.
Story image
Cybersecurity
Biometric authentication balances security and simplicity
One touch of a fingerprint or face scan can securely grant access – a much more seamless user experience than remembering and typing out a password.
Story image
Cryptocurrency
Can we protect against cryptocurrency theft?
Once cryptocurrency is stolen, there is no refund like there is with a bank or credit card company, and governments offer no protection for users.
Story image
Data breach
Cloud security planning – here’s to a safer future
Discussion is likely to focus on cloud security, with IT professionals asking themselves: How did we cope with the threat situation last year?
Story image
Firewall
Organisations still not getting cybersecurity fundamentals right - Wavelink
Research shows that nearly 60% of organisations that suffered a data breach in the two years between 2016 and 2018 fell victim to a known vulnerability with patches available.
Story image
Identity and Access Management
Thales announces expanded access management capabilities
New adaptive authentication, single sign-on and application visibility capabilities have been made available for Thales SafeNet Authentication Service customers.
Story image
Multi-factor authentication / MFA
Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard
Enterprises looking to reduce the risk of cyber-compromise or attack need to think about adding multi-factor authentication technology to their arsenal.
Story image
Multi-factor authentication / MFA
Yubico launches lightning-compatible security key
Today, the YubiKey 5Ci can be used to secure the 1Password, Bitwarden, Dashlane, Idaptive, LastPass, and Okta iOS mobile applications.
Story image
Identity and Access Management
92% of businesses experience identity challenges - LastPass
Data from the report reveals IT professionals overwhelmingly (82%) agree that poor identity practices have exposed their business to risks.
Story image
Cloud platforms
Ping’s significant expansion of its cloud identity solution
PingOne for Customers adds new features designed to create seamless and secure user experiences.
Story image
Identity and Access Management
LogMeIn expands cloud identity capabilities with new offerings
Many small and medium-sized companies don’t have the resources to implement robust security programs.
Story image
Identity and Access Management
Ping Identity offerings accelerates cloud MFA and SSO adoption
90% of respondents trust MFA as an effective security control to protect identity data in public clouds, yet only 60% of organisations have formally adopted it.
Story image
Multi-factor authentication / MFA
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Story image
Passwords
NDB report: Stronger authentication practices needed
The Australian Information Commissioner (OIAC) has released the latest quarterly report on the notifications under the Notifiable Data Breaches scheme.
Story image
Cybersecurity
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Story image
Artificial Intelligence
Okta launches risk-based authentication with machine learning
The new feature will allow enterprises to automate security by implementing significantly stronger authentication techniques and remediation when the scenario calls for it.
Story image
Cloud Security
Okta brings centralised identity security to servers
“Server access has traditionally relied on shared credentials that may never change, and that creates significant vulnerabilities for large or growing organisations.”