With widespread use of Active Directory across industries and organizations of all sizes, it is frequently a target for bad actors who can use a cracking dictionary or exposed credentials to gain unauthorized access to an employee's account.
Multifactor authentication remains an industry best practice
for preventing unauthorized account access.
Download this report to learn more about:
The state of MFA and password security;
What your company needs to know about best practices for MFA
Improving your company's cyber hygiene.
Following racist and anti-Semitic tweets being posted for a short time to Twitter CEO Jack Dorsey's hijacked account - despite his use of two-factor authentication - Twitter blamed the security lapse on an unnamed mobile provider. A group called "Chuckling Squad" appears to be responsible.
Every industry is vulnerable to breaches - and more often than not, weak or stolen passwords are the culprit of confirmed data breaches. That shows that many attacks are relying on tried-and-true methods, but that isn't necessarily a good thing. Despite the growing capacity to detect known threats, user credentialing...
Finding a true 50-50 balance between security and convenience may be a tad unrealistic, but your company should evaluate its online activities to determine an acceptable and practical level for each.
Download this white paper and learn:
Eight steps to define your Security - Convenience tolerance;
The promise of an integrated identity and risk platform that continuously monitors a myriad of suspicious activities across channels and applications, and dynamically orchestrates authentication and authorization actions has been around for over a decade. Many organizations and technology vendors have attempted to...
A Texas-based healthcare system says hackers unsuccessfully tried to divert employee payroll direct deposits through a phishing attack that also potentially exposed patient data. The incident illustrates how business processes can help avert theft.
The Internal Revenue Services' internal financial reporting systems and IT infrastructure have 14 new security vulnerabilities, along with a long list of previously unresolved deficiencies, according to a U.S. Government Accountability Office audit.
As mass-scale attacks become more sophisticated, leading organizations are benefiting from behavioral biometrics to protect their most valuable assets.
Facing a daily stream of attacks that outdated solutions could not identify, one top international bank implemented 360-degree protection for one of their most...
Getting hit by "constantly-changing attacks" is the new normal in a developing threat landscape.
One eCommerce company used the NuData platform to identify and adapt to evolving attacks.
Download this case study to learn more about:
How to combat mass scale attacks at your login placement;
Blocking repeat attacks...
Authentication vulnerabilities in certain GE Healthcare anesthesia devices could potentially allow remote attackers to meddle with the devices, researchers say. GE disputes some of the findings. Find out what other security experts have to say.
Iran is increasing its malicious cyber activity against the U.S, which could manifest in attacks that render computers unusable, a top U.S. cybersecurity official says. The warning comes after the U.S. reportedly targeted Iranian computer systems in response to the downing of a surveillance drone.
Some federal agencies inappropriately continue to rely on knowledge-based authentication to prevent fraud and abuse even though this method is no longer trustworthy because so much personal information that's been breached is readily available to fraudsters, a new
U.S. Government Accountability Office report notes.
Apple will introduce a feature in its new iOS 13 operating system later this year that allows the use of Apple credentials to log into other services. The feature is designed to reduce the amount of personal information that app developers obtain, a clear shot across the bow of Facebook and Google.
The right authentication controls at the right time for the right transactions - the adaptive authentication message is taking off, says OneSpan's Tim Bedard. And here are some quick wins organizations might focus on when starting down the path.