Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Centrify, a Santa Clara, California-based provider of Identity Management solutions, today announced it has raised a massive $42 million round of funding.
Bitly, the popular URL shortening service used to share links through social media and other means, warned on Thursday that user account credentials may have been compromised.
The Kerberos authentication protocol enables a disabled user account to remain valid for up to 10 hours after having been revoked, researchers say.
The "Covert Redirect" security issue uncovered in login tools OAuth and OpenID, places the responsibility for user security in the wrong place, experts say.
NetSupport, a remote management tool used in some enterprises can be exploited by attackers to remotely connect to a host without needing any passwords, according to a Trustwave researcher.
Entrust launched a new cloud-based service that consolidates the management of digital identities, SSL certificates and credentials via a single solution platform.
Many businesses are looking at SMS-based two-factor authentication as a way to improve verification of customer identities, according to a new survey
In response to the vulnerabilities and hassles of the antiquated username-and-password formula, Winfrasoft has developed an alternative based on a four-color grid with numbers inside that resembles a Sudoku puzzle.
Google has quietly acquired security startup SlickLogin, an Israeli company working on innovative authentication solutions that leverage mobile and audio technology.
A new report by Dell SecureWorks researchers shines the light on the most prevalent banking Trojans of 2013.

FEATURES, INSIGHTS // Identity & Access

rss icon

Chris Hinkley's picture
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.
Michael Callahan's picture
There are several steps companies can take on the server side to identify and disrupt brute force attacks.
Mike Tierney's picture
Much can be learned from airport security that can applied to dealing with insider threats. As a starting point, let’s compare two approaches to airport security – the US approach and the Israeli approach.
Gil Zimmermann's picture
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Nimmy Reichenberg's picture
By including security into the DevOps model, organizations can attain that improved agility and operational excellence while also improving the necessary checks and balances before changes are pushed into production.
Nick Cavalancia's picture
Recognized Big Data security solutions can only examine data that administrators and engineers have programmed them to identify. They cannot, on their own, choose to browse data sets that they "think" might yield information, nor can they detect information about risky user behaviors that hasn't been captured.
Mark Hatton's picture
Despite the billions of dollars spent annually by government and private industry to protect their networks and critical data assets, the large majority of breaches can be tied directly to human error and/or a breakdown in protocol.
Chris Hinkley's picture
Without the internal and external safeguards working in conjunction, your vulnerability will spike and your performance will suffer as a by-product -- two things you can’t afford to have happen.
Tal Be'ery's picture
When it comes to setting the standards for crucial internet functionality such as authentication, the Internet community must remain vigilant and carefully examine and scrutinize change proposals, to ensure they support the greater good of all of the Internet users.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!