Suddenly, onboarding, servicing and securing digital accounts with advanced authentication techniques isn't just a priority for global enterprises; it is the priority. Dean Stevenson of HID Global previews an upcoming virtual roundtable discussion.
Twitter says attackers who hijacked more than 130 high-profile Twitter accounts used social engineering to bypass its defenses, including two-factor authentication on accounts. Experts say companies must have defenses in place against such schemes, which have long been employed by fraudsters.
An identity and access management strategy for a hybrid cloud environment should include single sign-on as well as multifactor authentication, says Andrew Koh, deputy general manager and regional lead-Risk at Habib Bank Ltd. in Singapore.
Ramping up authentication as e-commerce continues to grow requires achieving a delicate balance of a frictionless, yet secure, consumer experience, says Robert Capps of NuData Security, a unit of Mastercard.
Implementing trusted digital IDs will create benefits for end users as well as service providers, says Nick Mothershaw, chair and executive director at the Open Identity Exchange. But widespread international adoption of such IDs will take time to achieve, he acknowledges.
Many ethical hackers and other security professionals, such as penetration testers, have weaponized cloud platforms to host online attack infrastructure or have used the platforms to conduct reconnaissance, according security researchers at Texas Tech University.
It is important to have contextual authentication in place to manage privileged as well as less privileged accounts in an organization, says Avinash Tiwari, CISO and head, information security, at Pidilite Industries, a large manufacturing firm.
Addressing digital payment security challenges requires having good identity verification capabilities as well as a strong authentication process that's friction-free for consumers, says Singapore-based Gautam Aggarwal, senior vice president and regional chief technology officer, Asia Pacific, at Mastercard.
With 82 per cent of CISOs feeling burnt out, what's going on in the cyber industry to cause this? And what can be done to stop CISO burnout? The Cybersecurity special report, published in The Times, explores the cybersecurity industry from C-suite roles to cyber threats while working from home. It looks at the...
Even after being notified that their personal data has been compromised in a breach, only about a third of users change their passwords - and most are not strong or unique, according to a study by researchers at Carnegie Mellon University, who call for changes in breach notification procedures.
The massive shift to remote working as a result of the COVID-19 pandemic means more organizations are adopting the "zero trust" model, taking such steps as implementing proper access controls, monitoring user behavior and building data governance policies.
Mphasis, the IT service management company, has made many adjustments to its risk management strategy - including wider use of multifactor authentication - as a result of more staff members working from home, says Sethu S. Raman, senior vice president and chief risk officer.
Security experts and law enforcement officials have long argued that paying ransoms doesn't pay. For starters, it directly funds the cybercrime ecosystem and makes it attractive for criminals to keep launching ransomware attacks.