informa

Authentication

Biden Broadens NSA Oversight of National Security Systems
New Cybersecurity National Security Memorandum will let the spy agency "identify vulnerabilities, detect malicious threat activity and drive mitigations," agency cybersecurity director says.
January 20, 2022
New Cybersecurity National Security Memorandum will let the spy agency "identify vulnerabilities, detect malicious threat activity and drive mitigations," agency cybersecurity director says.
by Dark Reading Staff, Dark Reading
January 20, 2022
2 min read
Article
Nigerian Police Arrest 11 Individuals in BEC Crackdown
More than 50,000 targets around the world have been affected by the business email compromise scams, Interpol reports.
January 19, 2022
More than 50,000 targets around the world have been affected by the business email compromise scams, Interpol reports.
by Jai Vijayan, Contributing Writer
January 19, 2022
5 min read
Article
1Password Raises $620M Series C, Now Valued at $6.8B
The massive funding round comes as the rise of cloud and remote work led to new threats and growing security and privacy concerns.
January 19, 2022
The massive funding round comes as the rise of cloud and remote work led to new threats and growing security and privacy concerns.
by Dark Reading Staff, Dark Reading
January 19, 2022
2 min read
Article
Future of Identity-Based Security: All-in-One Platforms or Do-It-Yourself Solutions?
The functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of businesses, or customer communities.
December 22, 2021
The functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of businesses, or customer communities.
by Mark Settle, Seven-Time CIO
December 22, 2021
5 min read
Article
Identity Authentication Access Market Set to Hit $28.9B in 2021
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers, and trends are explored.
December 10, 2021
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers, and trends are explored.
by Don Tait, Senior Analyst, Omdia
December 10, 2021
3 min read
Article
Why Should I Adopt a Zero-Trust Security Strategy?
Zero-trust is the right approach for protecting your end users. Executing it in the right way will also help you comply with NIST standards and upcoming federal mandates.
November 23, 2021
Zero-trust is the right approach for protecting your end users. Executing it in the right way will also help you comply with NIST standards and upcoming federal mandates.
by Ash Devata, General Manager, Cisco Zero Trust and Duo Security
November 23, 2021
2 min read
Article
North Korean Hacking Group Targets Diplomats, Forgoes Malware
The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.
November 18, 2021
The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.
by Robert Lemos, Contributing Writer
November 18, 2021
4 min read
Article
Building Bridges to a More Secure Hybrid Workplace
Wherever workers choose to do their jobs, they need technology that's unobtrusive, secure by design, and intuitive to use.
November 09, 2021
Wherever workers choose to do their jobs, they need technology that's unobtrusive, secure by design, and intuitive to use.
by Ian Pratt, Global Head of Security for Personal Systems at HP Inc.
November 09, 2021
5 min read
Article
What Security Strategies Are Driving InfoSec's Decisions Around Defense?
The data shows security leaders are focusing on multilayered defenses, including multifactor authentication, threat intelligence, and incident response.
November 08, 2021
The data shows security leaders are focusing on multilayered defenses, including multifactor authentication, threat intelligence, and incident response.
by Dark Reading Staff, Dark Reading
November 08, 2021
2 min read
Article
SecureAuth Buys Acceptto to Deliver Low-Friction Authentication to Enterprises
Acceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.
November 06, 2021
Acceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.
by Dark Reading Staff, Dark Reading
November 06, 2021
2 min read
Article
How Is Zero Trust Different From Traditional Security?
Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.
November 04, 2021
Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.
by Ash Devata, General Manager, Cisco Zero Trust and Duo Security
November 04, 2021
1 min read
Article
Phishing and Spam Lures Feature Sports, Aim to Steal Credentials
Spam volume declined slightly in the third quarter, but attackers sent almost 36 million malicious email attachments, up 5% from the previous quarter, one security firm says.
November 02, 2021
Spam volume declined slightly in the third quarter, but attackers sent almost 36 million malicious email attachments, up 5% from the previous quarter, one security firm says.
by Robert Lemos, Contributing Writer
November 02, 2021
4 min read
Article
Enterprises Allocating More IT Dollars on Cybersecurity
Enterprises are allocating more IT dollars toward implementing a multilayered approach to securing data and applications against new threats, data shows.
October 29, 2021
Enterprises are allocating more IT dollars toward implementing a multilayered approach to securing data and applications against new threats, data shows.
by Dark Reading Staff, Dark Reading
October 29, 2021
2 min read
Article
Onfido Acquires EYN to Provide Acoustic-Based Liveness Detection
Technology will be incorporated into Onfido’s Real Identity Platform.
October 27, 2021
Technology will be incorporated into Onfido’s Real Identity Platform.
October 27, 2021
4 min read
Article
Google: Phishing Campaign Targets YouTube Creators
The attackers behind the campaign, which distributes cookie theft malware, are attributed to actors recruited in a Russian-speaking forum.
October 20, 2021
The attackers behind the campaign, which distributes cookie theft malware, are attributed to actors recruited in a Russian-speaking forum.
by Dark Reading Staff, Dark Reading
October 20, 2021
2 min read
Article