Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Video conferencing platform Zoom this week announced that all user accounts can now benefit from improved protection, courtesy of support for Two-Factor Authentication (2FA). [Read More]
Yubico releases YubiKey 5C NFC, a new security key that features both NFC and USB-C connections. [Read More]
Vulnerabilities in the implementation of the payment card EMV standard allow for the mounting of attacks targeting both the cardholder and the merchant. [Read More]
Microsoft this week announced that the Transport Layer Security (TLS) 1.3 protocol is now enabled by default in Windows 10 Insider Preview builds, and that it will be rolled out to all Windows 10 systems. [Read More]
Password management solutions provider Keeper Security has raised $60 million in growth funding. [Read More]
Anti-fraud platform provider SpyCloud on Tuesday announced that it raised $30 million in a Series C funding round. [Read More]
Secure Access Service Edge (SASE) and Network-as-a-Service (NaaS) solutions provider Perimeter 81 has closed a $40 million Series B funding round that brings the total raised by the company to $65 million. [Read More]
Symmetry Systems, a provider of Data Store and Object Security (DSOS) solutions, has emerged from stealth mode with $3 million in seed funding. [Read More]
Silverfort, a provider of an agentless, proxyless authentication platform, has raised $30 million in a Series B funding round led by Aspect Ventures. [Read More]
Google this week announced a series of security and ease-of-use improvements for the Autofill feature in Chrome. [Read More]

FEATURES, INSIGHTS // Identity & Access

rss icon

Jim Ducharme's picture
As the workforce continues to evolve, a one-size-fits-all approach won’t work for different identity and access management needs across organizations.
Torsten George's picture
Perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity- and credential-based threats.
Joshua Goldfarb's picture
Change may not always be on the docket, but when it is, how can we embrace it, understand it, and work to create a constructive environment around it?
Jim Ducharme's picture
In just about every case of digital identity, there seems to be a set of credential recovery mechanisms that are weaker than the authentication method itself.
Torsten George's picture
Organizations should recognize that not all authenticators are equally vulnerable to the mechanisms used to break the trust chain, which range from simple guesswork to coercion.
Jim Ducharme's picture
Now is the time to evaluate what methods of authentication will best serve your organization on the path to a passwordless future.
Jim Ducharme's picture
If you want to succeed with FIDO, you have to be ready. Now is the time to assess your organization’s authentication needs, how they are evolving, and the dynamics of your user population.
Jim Ducharme's picture
It’s time to address some myths about how facial recognition works, to help increase consumer comfort with biometric-authentication technology.
Torsten George's picture
Companies should consider moving to a Zero Trust approach, powered by additional security measures such as multi-factor authentication, to stay ahead of the security curve and leave passwords behind for good.
Jim Ducharme's picture
The ultimate goal for identity and access management (IAM) is not to find the unbreakable or “unhackable” code for authentication; rather, it’s to layer security to create a much stronger identity assurance posture.