Password Spraying – The Citrix Breach

By |March 18th, 2019|Categories: Articles|Tags: , |

On March 8, Citrix posted a statement confirming that the company's internal network had been breached. Citrix became aware of the attack a couple of days earlier when the FBI advised that they had reason to believe that cyber criminals gained access to Citrix’s internal network. Cybersecurity firm Resecurity claimed it had alerted Citrix to the attack as early as December [...]

Asigra and Secret Double Octopus Partner to Provide Top-flight Authentication for Cloud-based Data Backups Susceptible to Ransomware Attacks

By |March 13th, 2019|Categories: Press Release|

TORONTO and TEL AVIV, Israel, March 13, 2019 - Asigra Inc., a leading cloud backup, recovery and restore software provider and Secret Double Octopus, the pioneer of Password-Free Enterprise Authentication, announced today their partnership to provide a critical layer of authentication to Asigra's advanced anti-ransomware technology, preventing malware threats from silently targeting backup data. Protecting enterprise data is critical, requiring frequent cloud backups to guard against [...]

Passwordless Authentication for the Real-world

By |March 6th, 2019|Categories: Articles|Tags: , , |

Recently Microsoft rolled out support for a passwordless authentication option in Windows 10. As of build 18309, Windows 10 users can setup and sign in using a phone number account, without ever having to create, or deal with a password. Other capabilities previously rolled out to help eliminate passwords include replacing them with biometrics and PINs. Passwords are a security concern [...]

How stolen passwords are damaging the cybersecurity industry

By |February 21st, 2019|Categories: Articles|Tags: , , |

On February 14, dating site Coffee Meets Bagel sent an email to its users, informing them that an unauthorized party may have gained access to their data. This is not the kind of Valentine’s Day message you would expect from a website that is supposed to help you find love. Coffee Meets Bagel was part of bundle online services whose stolen [...]

Big Credential Breaches

By |February 12th, 2019|Categories: Articles|Tags: , |

In today’s digital threat landscape, large-scale information compromise is no longer big news. Averaging one a month, hackers have consistently managed to execute major breaches against organizations the world over, resulting in millions of compromised identities But the sheer scale of the most recent mega breach makes it something unique. Dubbed Collection #1 by its discoverer Troy Hunt, the breach amounts [...]

Establishing strong authentication for PSD2

By |January 31st, 2019|Categories: Articles|Tags: , , , , |

September 14, 2019 will mark a milestone date for the online payment industry. That’s when the Strong Customer Authentication (SCA) regulation will come into effect. As part of the Revised Payment Service Directive (PSD2), SCA imposes stricter security rules on payment service providers to protect customers and merchants against the mounting threat of online fraud. Whether you’re running a business that [...]

Securing Remote Access – The Guide

By |January 24th, 2019|Categories: Articles|Tags: , , |

Among the elements of cybersecurity, the human factor in data security continues to be the most difficult to control--and cybercriminals know it. Of all the areas of a network vulnerable to human error, remote access channels are probably most susceptible to attack and a likely route for hackers trying to breach an organization. Common remote access solutions targeted by hackers include [...]

How to Evaluate Push Authentication Solutions

By |January 21st, 2019|Categories: Articles|Tags: , , |

It should come as no surprise that the global market for multi-factor authentication (MFA) technology is expected to grow fourfold by 2025. On the one hand, software continues to eat the world and online services are becoming increasingly important in every aspect of daily life, business, health care, politics, military, etc. On the other hand, data breaches are also rising in [...]

Preventing Corporate Account Takeover (CATO)

By |January 14th, 2019|Categories: Articles|Tags: , , |

Businesses of all types and sizes present attractive targets for today’s cybercriminals. This is due to the simple fact that user accounts attached to organizations tend to give access to more assets than private ones. As the sophistication of cyber criminals has increased, the threat of the Corporate Account Takeover (CATO) has grown in tandem. For years, incidents of CATO have, [...]

How will Authentication Look Like in 2019

By |January 2nd, 2019|Categories: Articles|Tags: , , |

With 2019 starting, it’s a good time to look back at 2018 to remember the lessons learned from security incidents involving user authentication and examine how the landscape will look like in the next year.   Poor passwords continue to take their toll Like every year, 2018 taught us that poor passwords haven’t gone away, and they continue to give hackers [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search