SecurityBrief Australia logo
Australia's leading source of cybersecurity and cyber-attack news

User authentication news stories

Story image
Cyber Criminal
Email fraud identified as top attack vector - Proofpoint
More than three quarters of ASX 200 companies are subjecting customers, partners and employees to higher risks of email fraud.
Story image
Biometrics
We're not ready for passwordless systems—and that's quite alright
Although passwordless authentication options are gaining prominence, there's a reason why we're still using passwords 60 years after their inception: they're effective. 
Story image
Partnerships
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user.
Story image
Remote Working
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.
Story image
Cybersecurity
Bitglass receives US patent for SAML technology
Bitglass designed its SAML relay to allow a cloud access security broker (CASB) to be inserted into the traffic flow between users and cloud services during the login process.
Story image
Cloud Security
The 5 most common multi-factor authentication (MFA) methods
While MFA is ubiquitous, it’s far from perfect – whether you’re the business or the end-user. Here are the 5 most common MFA methods, and where each of them falls short. 
Story image
Cybersecurity
The real reason to use risk-based authentication in the enterprise
By analysing what the user knows, has, and does, the risk engine can identify legitimate users while denying access to intruders.
Story image
Cybersecurity
Security experts underscore identity assurance in post-lockdown era
Organisations should rebuild, re-prioritise and re-assess their current security programs, with the ultimate goal of enhancing threat response. 
Story image
Disaster Recovery
Your dynamic workforce just got a whole lot more dynamic
Overnight, your dynamic workforce just got even more dynamic - and not in the ways that anyone particularly wants.
Story image
Report
Bitglass report finds 66% of companies omit key security tool
The report found that only 34% of companies are authenticating users accessing cloud data via SSO.
Story image
Microsoft
Microsoft achieves FIDO2 certification for authentication solution
FIDO2 is a set of standards that enables easy and secure logins to websites and applications via biometrics, mobile devices and/or FIDO Security Keys.
Story image
Identity and Access Management
W3C and FIDO Alliance finalise web standard for passwordless logins
Major browsers and platforms now have built-in support for the new WebAuthn security standard.
Story image
Identity and Access Management
Japan's MUFG Bank deploys Nok Nok Labs biometric authentication
Customers at Japan’s MUFG Bank now have access to a range of new biometric authentication options for their mobile devices.
Story image
Identity and Access Management
Averon and tyntec partner to deliver secure wireless authentication
“While myriad authentication solutions have come and gone, user impact and experience have remained stagnant in recent years.”
Story image
Identity and Access Management
One Identity launches authentication services for Unix systems
Unix systems (including Linux and Mac OS), by their very nature, have distinct challenges when it comes to security and administration.
Story image
Passwords
Yubico report reveals troubling password behaviour
Some shocking results include that 57% of respondents who have experienced a phishing attack have not changed their password behaviours.
Story image
DigiCert
USB regulatory body launches USB-C authentication programme
USB Type-C Authentication empowers host systems to mitigate risks from malicious firmware/hardware in USB devices attempting to exploit a USB connection.
Story image
Identity and Access Management
Akamai acquires Janrain for access management capabilities
Janrain enables enterprises to enhance digital trust by offloading login and registration workloads.
Story image
Mobile Security
HID Global brings high authentication to mobile
The company’s new offering brings the security of physical authentication to Android and iOS with near-field communication technology.
Story image
Machine Learning
Silent authentication may be the next best thing for last-mile delivery
While most conglomerate merchants now offer decent delivery options, improvements remain to be made.
Story image
Venafi
Four Major Misunderstandings about public key infrastructure (PKI)
There’s a misconception that public key infrastructure (PKI) is dead.
Story image
Remote Working
Facebook & Amazon have better authentication methods than enterprises, say IT pros
Facebook and Amazon may have better authentication methods than the average enterprise, some IT professionals believe.
Story image
Digital Transformation
Australia's Digital ID framework is now one step closer to reality
“We believe that it should be safe and easy for everyone to prove who they are. This means giving people a secure option to verify their identity."
Story image
Mergers and Acquisitions
Done deal: LexisNexis and ThreatMetrix fight fraud as one
"The marketplace recognises us for developing and leveraging technology and advanced analytics to innovate fraud solutions that protect society."