Passwords are supported everywhere. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy." In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords.
In the latest weekly update, ISMG editors discuss the industrywide implications of a teenager hacking into Uber's internal systems, key trends in the new Gartner SD-WAN Magic Quadrant report, and how ethics and security culture are center stage due to recent CISO revelations at Uber and Twitter.
Decentralized identifiers and verifiable credentials, in which consumers can use their digital identity credentials for a variety of tasks, have significant evolving potential within the realm of identity and access management, says Merritt Maxim, vice president and research director at Forrester.
Japanese conglomerate Hitachi has sold its small identity-as-a-service practice to Canadian software specialist Volaris Group to drive better execution around core products. The firm found it was easy to get lost within Hitachi given the conglomerate's size and focus on electronics and engineering.
NortonLifeLock and Avast completed their $8.6 billion merger Monday, forming a $3.5 billion consumer cyber protection behemoth with expertise across security, privacy and identity. The fully merged company will have fewer than 4,000 employees and will initially go to market as NortonLifeLock.
Bitwarden has raised $100 million to expand into new product areas including developer secrets, passwordless and privileged access management. The investment will help the firm debut new features for individual and business users and expand its footprint in Japan, Germany, France and South America.
A month after his firm was taken private in a $6.9 billion deal, SailPoint founder and CEO Mark McClain discusses the prospect of consolidation, emerging competition and plans to expand "more quickly and aggressively" in the identity governance space - thanks to Thoma Bravo's financial backing.
Why is business identity theft increasing, and what are the latest tactics fraudsters are using to scam businesses and gig workers? Eva Velasquez, CEO at the Identity Theft Resource Center, shares her views on how business identity theft has evolved over the years and how to prevent it.
One of the biggest challenges for cybercriminals is how to defeat multifactor authentication. New research has uncovered a criminal service called "EvilProxy" that uses a technique called session hijacking to steal session cookies to bypass MFA and compromise accounts.
CrowdStrike CEO George Kurtz says the size of the untapped opportunity around identity protection mirrors where the endpoint detection and response market was many years ago. The company saw over the last quarter a doubling of the number of customers subscribing to its identity protection module.
They’re necessary contributors to the business ecosystem, but there’s risk associated with third-party remote access, including bad actors lurking around every access point.
Identity and access management giant Okta says some customer data was exposed by the "relentless phishing campaign" that breached Twilio, which it uses to provide some SMS services. Twilio says attackers accessed data for 163 customer organizations.
The recently discovered Russian-linked MagicWeb malware that exploits on-premises Microsoft Active Directory Federated Services servers to persist in compromised systems underscores the benefits of cloud-based infrastructure and a zero trust approach to architecture, security researchers say.
Implementation of security service edge technology has progressed over the past six months from early adopters to mainstream organizations, with requests for proposals around SSE projects now carrying tight deadlines rather than no deadline at all, says iboss co-founder and CEO Paul Martini.
Calling all Apple users: It's time to once again patch your devices to protect them against two zero-day vulnerabilities that attackers are actively exploiting in the wild to take complete control of devices. While there's no need to panic, security experts advise moving quickly.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.