User authentication stories
Email fraud identified as top attack vector - Proofpoint
More than three quarters of ASX 200 companies are subjecting customers, partners and employees to higher risks of email fraud.
We're not ready for passwordless systems—and that's quite alright
Although passwordless authentication options are gaining prominence, there's a reason why we're still using passwords 60 years after their inception: they're effective.
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user.
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.
Bitglass receives US patent for SAML technology
Bitglass designed its SAML relay to allow a cloud access security broker (CASB) to be inserted into the traffic flow between users and cloud services during the login process.
The 5 most common multi-factor authentication (MFA) methods
While MFA is ubiquitous, it’s far from perfect – whether you’re the business or the end-user. Here are the 5 most common MFA methods, and where each of them falls short.
The real reason to use risk-based authentication in the enterprise
By analysing what the user knows, has, and does, the risk engine can identify legitimate users while denying access to intruders.
Security experts underscore identity assurance in post-lockdown era
Organisations should rebuild, re-prioritise and re-assess their current security programs, with the ultimate goal of enhancing threat response.
Your dynamic workforce just got a whole lot more dynamic
Overnight, your dynamic workforce just got even more dynamic - and not in the ways that anyone particularly wants.
Bitglass report finds 66% of companies omit key security tool
The report found that only 34% of companies are authenticating users accessing cloud data via SSO.
Microsoft achieves FIDO2 certification for authentication solution
FIDO2 is a set of standards that enables easy and secure logins to websites and applications via biometrics, mobile devices and/or FIDO Security Keys.
W3C and FIDO Alliance finalise web standard for passwordless logins
Major browsers and platforms now have built-in support for the new WebAuthn security standard.
Japan's MUFG Bank deploys Nok Nok Labs biometric authentication
Customers at Japan’s MUFG Bank now have access to a range of new biometric authentication options for their mobile devices.
Averon and tyntec partner to deliver secure wireless authentication
“While myriad authentication solutions have come and gone, user impact and experience have remained stagnant in recent years.”
One Identity launches authentication services for Unix systems
Unix systems (including Linux and Mac OS), by their very nature, have distinct challenges when it comes to security and administration.
Yubico report reveals troubling password behaviour
Some shocking results include that 57% of respondents who have experienced a phishing attack have not changed their password behaviours.
USB regulatory body launches USB-C authentication programme
USB Type-C Authentication empowers host systems to mitigate risks from malicious firmware/hardware in USB devices attempting to exploit a USB connection.
Akamai acquires Janrain for access management capabilities
Janrain enables enterprises to enhance digital trust by offloading login and registration workloads.
HID Global brings high authentication to mobile
The company’s new offering brings the security of physical authentication to Android and iOS with near-field communication technology.
Silent authentication may be the next best thing for last-mile delivery
While most conglomerate merchants now offer decent delivery options, improvements remain to be made.
Four Major Misunderstandings about public key infrastructure (PKI)
There’s a misconception that public key infrastructure (PKI) is dead.
Facebook & Amazon have better authentication methods than enterprises, say IT pros
Facebook and Amazon may have better authentication methods than the average enterprise, some IT professionals believe.
Australia's Digital ID framework is now one step closer to reality
“We believe that it should be safe and easy for everyone to prove who they are. This means giving people a secure option to verify their identity."
Done deal: LexisNexis and ThreatMetrix fight fraud as one
"The marketplace recognises us for developing and leveraging technology and advanced analytics to innovate fraud solutions that protect society."