Multi-factor authentication (MFA) stories - Page 17
Around 17 million websites are already powered by WordPress - are they secure?
Thu, 20th Apr 2017
#
passwords
#
wordpress
#
mfa
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Microsoft launches ‘phone signin’ for Android and iOS - but what about its Windows Phone?
Thu, 20th Apr 2017
#
biometrics
#
microsoft
#
passwords
Microsoft has launched 'phone sign-in’ specifically for Microsoft accounts on Android and iOS - but what about Windows Phones?.
Identity theft - have you ever pen tested procedures?
Mon, 20th Mar 2017
#
devops
#
apm
#
software development
There is a focus on technical aspects of penetration tests, network and application security, while the chain is only as strong as its weakest link.
Centrify expands mobile security offerings across ANZ
Mon, 6th Mar 2017
#
iam
#
centrify
#
mfa
Centrify has expanded its ANZ suite of mobile security offerings, and the company says both Windows and Apple-based devices can now get in on the fun.
Palo Alto amplifies endpoint platform to tackle credential theft
Wed, 8th Feb 2017
#
firewalls
#
network infrastructure
#
network security
Credential abuse and theft are two main ways threat actors are able to compromise and move within an organisation to steal valuable assets.
Centrify recognised for cloud computing security excellence
Wed, 9th Nov 2016
#
cloud security
#
cybersecurity
#
centrify
Centrify's Centrify Identity Service (CIS) has won the 2016 Cloud Computing Security Excellence Award for Cloud Security.
Duo adds next-gen 'human' MFA identity access management offering to lineup
Wed, 19th Oct 2016
#
duo
#
linkedin
#
mfa
Duo is hoping to help resellers break ‘the circle of compromise’ with the signing of a distie deal for NoPassword multi-factor authentication IAM.
Multi-factor authentication to be the norm by 2020
Mon, 2nd May 2016
#
cybersecurity
#
unified computing
#
smb
Multi-factor authentication has become commonplace as a number of industries, particularly the govt sector, is looking to strengthen security measures.
Compromised credentials a leading point of attack in data breaches
Fri, 22nd Apr 2016
#
cloud security
#
breach prevention
#
cybersecurity
Survey shows compromised credentials contribute to nearly a quarter of data breaches, pushing companies to extend access control policies to third parties.
Big things are on the horizon for biometrics security
Wed, 23rd Mar 2016
#
surveillance
#
biometrics
#
cybersecurity
Biometrics industry to reach $30bn by 2021, driven by fingerprint sensors and facial recognition, says ABI Research.
ESET: Two-factor authentication crucial in today's world
Wed, 16th Mar 2016
#
malware
#
cybersecurity
#
passwords
ESET has officially announced a new version of its secure, mobile-based two-factor authentication system, ESA 2.4.
Centrify ups fight against enterprise attacks with 'MFA Everywhere'
Wed, 2nd Mar 2016
#
iaas
#
centrify
#
mfa
Centrify has launched a new initiative to secure enterprise identities against the most prevalent source of cyber attacks - compromised credentials.
Cloud IAM providing high growth potential
Thu, 28th Jan 2016
#
iam
#
allied market research
#
mfa
Cloud IAM market set to soar, with a 26.2% CAGR predicted by 2020, led by multi-factor authentication and Asia Pacific growth.
MFA quickly becoming the most popular form of authentication
Wed, 26th Aug 2015
#
uc
#
data protection
#
dr
Businesses are increasingly adopting multi-factor authentication amidst rising data breaches, moving away from traditional security questions.
Cybercrims bypassing two-factor authentication with simple txt
Thu, 18th Jun 2015
#
cybersecurity
#
symantec
#
mfa
Strong passwords and two-factor authentication are no match for simple social engineering, with Symantec warning of a new password recovery scam.
Users want proactive not reactive security solutions
Tue, 13th Jan 2015
#
ddos
#
data analytics
#
cloud security
Throughout 2014 there were an increasing number of high profile cyber security threats and breaches, and response is the difference between success and failure.
The App is King
Fri, 1st Oct 2010
#
virtualisation
#
firewalls
#
data protection
With the rise of cloud computing, traditional security measures falter, making secure application development essential—The app is now king.