SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

User authentication stories

Story image
Email fraud identified as top attack vector - Proofpoint
Thu, 10th Mar 2022
#
email security
#
cybersecurity
#
proofpoint
More than three quarters of ASX 200 companies are subjecting customers, partners and employees to higher risks of email fraud.
Story image
We're not ready for passwordless systems—and that's quite alright
Tue, 2nd Feb 2021
#
biometrics
#
passwords
#
mfa
Although passwordless authentication options are gaining prominence, there's a reason why we're still using passwords 60 years after their inception: they're effective. 
Story image
CrowdStrike targets Zero Trust blind spot with new offering
Thu, 15th Oct 2020
#
ai
#
malware
#
ai security
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user.
Story image
Yubico launches latest YubiKey with NFC & USB-C support
Fri, 11th Sep 2020
#
wfh
#
remote working
#
user authentication
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.
Story image
Bitglass receives US patent for SAML technology
Tue, 1st Sep 2020
#
cybersecurity
#
casb
#
saml
Bitglass designed its SAML relay to allow a cloud access security broker (CASB) to be inserted into the traffic flow between users and cloud services during the login process.
Story image
The 5 most common multi-factor authentication (MFA) methods
Tue, 7th Jul 2020
#
cloud security
#
mfa
#
user authentication
While MFA is ubiquitous, it’s far from perfect – whether you’re the business or the end-user. Here are the 5 most common MFA methods, and where each of them falls short. 
Story image
The real reason to use risk-based authentication in the enterprise
Fri, 3rd Jul 2020
#
cybersecurity
#
mfa
#
cybersafety
By analysing what the user knows, has, and does, the risk engine can identify legitimate users while denying access to intruders.
Story image
Security experts underscore identity assurance in post-lockdown era
Fri, 12th Jun 2020
#
cybersecurity
#
passwords
#
mfa
Organisations should rebuild, re-prioritise and re-assess their current security programs, with the ultimate goal of enhancing threat response. 
Story image
Your dynamic workforce just got a whole lot more dynamic
Tue, 10th Mar 2020
#
dr
#
iam
#
open source
Overnight, your dynamic workforce just got even more dynamic - and not in the ways that anyone particularly wants.
Story image
Bitglass report finds 66% of companies omit key security tool
Mon, 11th Nov 2019
#
casb
#
report
#
bitglass
The report found that only 34% of companies are authenticating users accessing cloud data via SSO.
Story image
Microsoft achieves FIDO2 certification for authentication solution
Thu, 9th May 2019
#
microsoft
#
biometrics
#
cybersecurity
FIDO2 is a set of standards that enables easy and secure logins to websites and applications via biometrics, mobile devices and/or FIDO Security Keys.
Story image
W3C and FIDO Alliance finalise web standard for passwordless logins
Tue, 5th Mar 2019
#
iam
#
user authentication
#
fido alliance
Major browsers and platforms now have built-in support for the new WebAuthn security standard.
Story image
Japan's MUFG Bank deploys Nok Nok Labs biometric authentication
Wed, 27th Feb 2019
#
biometrics
#
iam
#
hitachi
Customers at Japan’s MUFG Bank now have access to a range of new biometric authentication options for their mobile devices.
Story image
Averon and tyntec partner to deliver secure wireless authentication
Tue, 26th Feb 2019
#
iam
#
partnerships
#
user authentication
“While myriad authentication solutions have come and gone, user impact and experience have remained stagnant in recent years.”
Story image
One Identity launches authentication services for Unix systems
Tue, 26th Feb 2019
#
iam
#
unix
#
one identity
Unix systems (including Linux and Mac OS), by their very nature, have distinct challenges when it comes to security and administration.
Story image
Yubico report reveals troubling password behaviour
Wed, 30th Jan 2019
#
passwords
#
ponemon institute
#
user authentication
Some shocking results include that 57% of respondents who have experienced a phishing attack have not changed their password behaviours.
Story image
USB regulatory body launches USB-C authentication programme
Wed, 9th Jan 2019
#
digicert
#
usb-c
#
user authentication
USB Type-C Authentication empowers host systems to mitigate risks from malicious firmware/hardware in USB devices attempting to exploit a USB connection.
Story image
Akamai acquires Janrain for access management capabilities
Wed, 9th Jan 2019
#
ddos
#
iam
#
akamai
Janrain enables enterprises to enhance digital trust by offloading login and registration workloads.
Story image
HID Global brings high authentication to mobile
Thu, 29th Nov 2018
#
endpoint protection
#
smartphones
#
technology gifts
The company’s new offering brings the security of physical authentication to Android and iOS with near-field communication technology.
Story image
Silent authentication may be the next best thing for last-mile delivery
Tue, 5th Jun 2018
#
ai
#
biometrics
#
ml
While most conglomerate merchants now offer decent delivery options, improvements remain to be made.
Story image
Four Major Misunderstandings about public key infrastructure (PKI)
Mon, 21st May 2018
#
devops
#
venafi
#
key management
There’s a misconception that public key infrastructure (PKI) is dead.
Story image
Facebook & Amazon have better authentication methods than enterprises, say IT pros
Thu, 8th Mar 2018
#
wfh
#
mobility
#
iam
Facebook and Amazon may have better authentication methods than the average enterprise, some IT professionals believe.
Story image
Australia's Digital ID framework is now one step closer to reality
Mon, 5th Mar 2018
#
digital transformation
#
privacy
#
australian government
“We believe that it should be safe and easy for everyone to prove who they are. This means giving people a secure option to verify their identity."
Story image
Done deal: LexisNexis and ThreatMetrix fight fraud as one
Mon, 26th Feb 2018
#
mergers and acquisitions
#
threatmetrix
#
lexisnexis
"The marketplace recognises us for developing and leveraging technology and advanced analytics to innovate fraud solutions that protect society."
© 2023 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.