As the use of telehealth continues to surge during the COVID-19 crisis, healthcare entities and their vendors must take critical steps to keep patient data private and secure, says attorney Janine Anthony Bowen.
A hacking group targeting Iranian dissidents has developed malware that can bypass two-factor authentication protection on Android devices to steal passwords, according to Check Point Research. The hackers have also targeted victims' Telegram accounts.
An organization has successfully implemented a "zero trust" framework when it can achieve context-aware resolution of a risk, says Dr. Siva Sivasubramanian, CISO of SingTel Optus, an Australian telecommunications firm.
Federal authorities and medical device maker Philips have issued security alerts about security vulnerabilities in some of the company's patient monitoring software. Until patches are available, the company is recommending risk mitigation steps.
Consumers hate passwords, criminals love them. And while the journey to passwordless authentication takes time, there are lessons to be learned from major global organizations who have started down the path. Dr. Rolf Lindemann of Nok Nok Labs shares insights.
Fraudsters' methods of attack are evolving. Download this guide to learn how to detect account takeover attacks with adaptive MFA, risk analytics, and machine learning.
In this eBook, you will learn:
6 fraud techniques that lead to account takeover attacks;
How to help prevent attacks on the login process,...
Suddenly, onboarding, servicing and securing digital accounts with advanced authentication techniques isn't just a priority for global enterprises; it is the priority. Dean Stevenson of HID Global previews an upcoming virtual roundtable discussion.
Did you know?
59% of People mostly/always use the same password?
47% of People say they use the same password for their home and work network?
42% of people keep their passwords in an unprotected file?
Download this Guide to:
Determine What Aspects of MSBS require secure passwords
Learn the extra layers of...
Twitter says attackers who hijacked more than 130 high-profile Twitter accounts used social engineering to bypass its defenses, including two-factor authentication on accounts. Experts say companies must have defenses in place against such schemes, which have long been employed by fraudsters.
The world is on the move, and your end users are no exception. It's time to have a security plan that is built to work outside the perimeter. But what authentication strategy fits your needs?
Read this ebook to learn:
The pros and cons of 2-Factor (2FA), Multi-Factor (MFA), and Adaptive Multi-Factor Authentication...
Identity and access management shouldn't feel like a catch-22. On the one hand, you want to allow employees to work as they need to, which is often on the road or at home, not at the office. On the other hand, not a day goes by without security breaches making headline news. And you don't want to be that headline....
The Internet of Things (IoT) is opening up new opportunities for businesses and consumers, and is the linchpin of almost every digital transformation initiative. However, IoT also presents considerable security risks and challenges for organisations, specifically attackers impersonating a trusted device could conduct...
As Gartner says in their CARTA approach to fraud prevention, "without combining the perspectives of varying capabilities and coordinating a response, cracks remain for fraudsters to slip through."
Download this eBook and learn why, when it comes to online security, the insights you gain throughout the customer...
To ensure business continuity, companies that support India's critical infrastructure need to validate the functioning of the security controls and other tools deployed to support the remote workforce during the COVID-19 pandemic, says Mumbai-based Shivkumar Pandey, group CISO at the Bombay Stock Exchange.
It's no exaggeration to say that, in the midst of the COVID-19 pandemic, we now have the largest-ever global remote workforce. And with it comes an expanded attack surface that requires extra attention. Phil Reitinger of the Global Cyber Alliance shares five tips for securing the remote workforce.