Australia's leading source of security and threat news
These search results are from across the Techday Network of sites
Credential theft industry booming in US, declining in Asia & EU
New research reveals the US is ripe for harvest, but Blueliv says the declines in EU and Asia are almost definitely only temporary.
ISACA adds credentials for cybersecurity audits
The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits.
Access management employees will thank you for – Seos has you covered
Seos can be ported onto microprocessor devices, allowing the credential system to be delivered on mobile devices, wearables, and smart cards.
Singapore firm embraces blockchain to fight credential fraud
A Singapore tech firm is using blockchain technology to bring validation and authentication to CVs and other credential types.
Credential theft is the hottest trend for cyber attackers in Q2
This year cyber attackers have narrowed their focus to methods that involve credential theft, be it through malware, phishing or brute force attacks.
Javelin Networks: Give up on honeypots, because attackers will outsmart them
Honey tokens, which are honeypots that are not computers, are easily studied and avoided by the average attacker.
Poor password choices make it easy for credential stuffing attacks, Digital Shadows warns
“Enterprises - and the companies that work for and with them - need to be better prepared for this sort of brute force attack."
Digital university credentials enhance student mobility
"My eQuals will enhance student mobility & streamline processes for employers and others who will be able to verify the authenticity of credentials."
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?