SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Authentication stories - Page 21

Img 4698

Exclusive interview: Okta CSO on skill shortages, passwordless authentication, and UX

Tue, 12th Jun 2018
#
mfa
#
iam
#
passwordless
The tension between security and user experience is one IT practitioners have had to grapple with as businesses become more vulnerable to breaches.
Thinkstockphotos 643987950

Silent authentication may be the next best thing for last-mile delivery

Tue, 5th Jun 2018
#
biometrics
#
iam
#
ai
Silent authentication could revolutionise last-mile delivery, providing ultra-personalised, secure services via behavioural biometrics and smart technologies.
Gettyimages 1132912672

Four Major Misunderstandings about public key infrastructure (PKI)

Mon, 21st May 2018
#
devops
#
iam
#
apm
Contrary to the popular belief that public key infrastructure (PKI) is obsolete, it's more vital than ever for securing burgeoning cloud and DevOps ecosystems.
Gettyimages 901609212

Passwords: They're as useless as the 'g' in lasagna

Tue, 24th Apr 2018
#
mfa
#
iam
#
cybersecurity
Passwords have long been the primary method of authentication, but they're not secure. So what's the solution? Machine learning and automation.
Thinkstockphotos 668344470

Google rolls out phishing prevention amongst new G Suite security features

Mon, 26th Mar 2018
#
mfa
#
phishing
#
email security
Updates include phishing prevention, mobile device management, security keys for two-factor authentication, Information Rights Management, and more.
Thinkstockphotos 152946044

Why a secure perimeter is no longer enough protection for your IT infrastructure

Mon, 12th Mar 2018
#
mfa
#
mdm
#
iam
Digital identity is used as the key method of protecting digital assets regardless of their location or how they are being accessed.
Thinkstockphotos 700287204

Facebook & Amazon have better authentication methods than enterprises, say IT pros

Thu, 8th Mar 2018
#
iam
#
hybrid & remote work
#
cybersecurity
Facebook and Amazon may have better authentication methods than the average enterprise, some IT professionals believe.
Thinkstockphotos 925144896

Australia's Digital ID framework is now one step closer to reality

Mon, 5th Mar 2018
#
digital transformation
#
iam
#
risk & compliance
Australia's Trusted Digital Identity Framework moves closer to reality as DTA consults with experts to develop accreditation standards.
Thinkstockphotos 675942318

Interview: Unravelling the myths of chatbot security and identity theft in banking

Mon, 5th Mar 2018
#
uc
#
mfa
#
martech
Banks in Australia are embracing artificial intelligence chatbots for customer service, but face security risks.
Thinkstockphotos 915689772

Done deal: LexisNexis and ThreatMetrix fight fraud as one

Mon, 26th Feb 2018
#
iam
#
risk & compliance
#
cybersecurity
ThreatMetrix has completed its acquisition by RELX Group's risk and business analytics segment in a deal worth over AU$1bn.
Thinkstockphotos 477245744

25% of firms fail to implement multi-factor authentication for BYOD

Fri, 16th Feb 2018
#
data protection
#
surveillance
#
biometrics
25% of respondents at the Gartner Symposium lacked some form of multi-factor authentication when securing BYOD.
Thinkstockphotos 855246362

Fujitsu rolls out Biometrics-as-a-Service to Australian enterprises

Thu, 1st Feb 2018
#
biometrics
#
mfa
#
iam
Fujitsu's cloud-based multimodal biometrics-as-a-service solution will enable Australian organisations to deploy biometric authentication.
Thinkstockphotos 855958564

ThreatMetrix to merge with LexisNexis Risk Solutions after $1 billion buyout

Wed, 31st Jan 2018
#
iam
#
risk & compliance
#
cybersecurity
Global analytics provider RELX Group has paid £580 million (AU$1.01 billion) to buy out the entire issue share capital of ThreatMetrix.
Thinkstockphotos 695701540 1

Okta report says security is changing workplace app use

Fri, 26th Jan 2018
#
mfa
#
iam
#
cybersecurity
Okta's 2018 Businesses @ Work report, which found that seven of the 15 fastest-growing apps are security tools or have security use cases.
Rodion kutsaev 184298 1

Gartner's ten predictions for smartphone AI developments

Mon, 8th Jan 2018
#
iam
#
ai
#
cybersecurity
Gartner predicts smartphone AI will evolve into personalised companions by 2022, with 80% of devices boasting on-device AI, up from 10% in 2017.
Thinkstockphotos 886718642

IoT, cryptocurrency, Linux & WiFi hacks: WatchGuard's security predictions for 2018

Thu, 7th Dec 2017
#
malware
#
firewalls
#
network infrastructure
WatchGuard Technologies has whipped up some key IT security predictions ranging from IoT botnets to Linux attacks.
Thinkstockphotos 823418558

RSA expands authentication footprint with four major security firms

Wed, 29th Nov 2017
#
virtualisation
#
firewalls
#
network infrastructure
RSA has announced authentication partnerships with the likes of CyberArk, Microsoft, Palo Alto Networks and VMware.
Thinkstockphotos 851960194

How the future will blur the lines of authentication & identity management

Tue, 14th Nov 2017
#
biometrics
#
mfa
#
physical security
According to Verizon's 2017 Data Breach Investigation Report, 81% of hacking-related breaches leveraged stolen or weak passwords.
Hand data

1 in 4 organisations relying solely on passwords to secure BYOD

Tue, 7th Nov 2017
#
malware
#
mfa
#
casb
​Bitglass has released the findings from its newest research, 'BYOD and Identity', which are alarming to say the least.
Thinkstockphotos 840534924

Exclusive: ESET on why the humble password is here to stay

Mon, 30th Oct 2017
#
malware
#
biometrics
#
mfa
ESET's Nick FitzGerald discusses the enduring relevance of passwords, advocating for long, memorable phrases to enhance security without regular changes.