Security Experts:

long dotted


A new survey suggests that while security awareness is improving, security preparedness is not keeping pace. [Read More]
UnifyID uses machine learning to analyze a range of behavioral characteristics that currently combine to authenticate an individual with a claim of 99.999% accuracy. [Read More]
HSBC bank has become the latest financial institution to adopt smartphone-based biometrics as a form of user authentication. [Read More]
Okta claims to have the largest ecosystem of vendor-neutral integrations within a single fabric covering the entire identity and access management enterprise requirement. [Read More]
Researchers with the University of North Carolina at Chapel Hill have demonstrated a new method of successfully bypassing modern face authentication systems. [Read More]
Is deprecating SMS-based 2FA good advice? SecurityWeek talked to consultants, vendors and practitioners – and found a divergent range of views. [Read More]
FalseCONNECT, a vulnerability that exposes proxy server connections to MitM attacks, affects software from Apple, Microsoft and others [Read More]
Microsoft has released yet another patch related to the evil maid and remote butler attacks [Read More]
An issue affecting Microsoft’s Windows operating system could result in leaked user credentials if Internet Explorer and Edge are being used, researchers discovered. [Read More]
Google said it will now notify users when new devices are added to their accounts. [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Rafal Los's picture
If you’re tired of changing your passwords using complex formulas you’ll never remember and have found yourself wondering just what your corporate security team is thinking, this post is for you.
David Holmes's picture
Password proliferation is bad, for many, many, many reasons. But the worst reason is that people tend to re-use passwords all over the place.
Travis Greene's picture
Two-factor authentication (2FA) is becoming more mainstream for businesses; however, businesses need to consider how 2FA should be implemented to maintain both external and internal control.
Travis Greene's picture
As the demand for identity governance in Asian companies grows, the key differentiator is that it’s going to come from a need to reduce risk.
Travis Greene's picture
While Identity and access management (IAM) is a mature discipline supporting internal employee access to applications, what is the future of IAM in support of end customer interactions?
Travis Greene's picture
Like all security measures, MFA is not an instant fix to safeguard credentials. But, understanding the risks of MFA limitations is the first step towards mitigation.
Travis Greene's picture
Passwords really are that bad, and we now have another mandate to address this ongoing issue, or, the so-called elephant in the room: The growing push for multi-factor authentication.
Travis Greene's picture
When big stories like the release of the Panama Papers breaks, it is an opportunity to self-evaluate what level of risk your organization could be exposed to.
Rafal Los's picture
Attackers are exploiting issues in corporate identity stores with greater frequency. If you doubt the danger that identities pose to your organization, you should conduct a simple test.
Travis Greene's picture
It’s been said that the military is always preparing to fight the last war. Are we doing the same in IT security? Are we doomed to always react to the threat?