What does Microsoft’s move mean for passwords?

password-on-laptop

The FIDO Alliance (Fast Identity Online Alliance) recently awarded Microsoft Hello, Microsoft’s Windows facial recognition system, FIDO2 certification. With this certification, Windows devices can use biometrics — such as facial recognition, fingerprint, or FIDO2 security keys — to authenticate to devices. While this news is Microsoft focused, it’s part of a broader push to depreciate […]

DDoS attacks grow more popular, targeted

several-darts-in-bullseye

A new State of the Internet/Security: Web Attack report finds the number of distributed denial of service attacks to be growing, already up 16 percent over all of last year. The report also found that Russia and China are initiating the most credential-based attacks against the hospitality industry. The report proved records are made to be […]

Biometrics (finally) gaining widespread acceptance

full-hand-biometric-scanning

It’s time for passwords to die, they said. Passwords are antiquated and don’t provide the level of security needed, they said. This was the marketing mantra of many an authentication and identity management vendor — 20 years ago. Of course, then, passwords were not on their way out. They were still on their way up. […]

Carriers collaborating to improve mobile security

Mobile-Parts

One of the biggest challenges for enterprise IT managers today is securing mobile devices. While the major obstacles to mobile security (as all IT pros know) are users, technology vulnerabilities also play a part in making mobile devices a risk to enterprise networks and data. That’s because users often are forced to jump through multiple […]

Cool security tools your mobile workers just might use

As any IT professional knows, enterprise mobile workers typically aren’t as security conscious as, well, IT professionals. Understandable to be sure, but vexing nonetheless! Poor security practices — ranging from losing mobile devices to failing to use encryption on public Wi-Fi networks — can result in data loss and theft, brand damage, compliance penalties and more. […]

CEO fraud: With billions lost, is your organization at risk?

CEO Fraud social engineering CSC BlogsCEO Fraud social engineering cybersecurity CSC Blogs

Social engineering is one of the most popular and oldest scam techniques that actually works. As we have already moved on to the cyber age, where our financial records, research and development data, social life or medical history exist online, it is really crucial that this kind of information does not fall prey to fraudsters. However, it […]

Is it time to STOP expiring passwords?

Picture the scene: You’ve just been on a wonderful vacation it’s been a great time to relax and do something you love, but now you are walking into your place of work. Waiting for you is a mountain of emails and you want to get right to it. You take out your iPad, Android tablet or open […]

4 steps toward securely jump-starting a mobile initiative

There are a number of perceived obstacles standing between many enterprises and a mobility program. While concerns about security and costs tend to top the list of mobile barriers, the sheer scope of a mobility initiative also can dissuade some CIOs and other enterprise decision-makers from taking the plunge. But the advantages of enterprise mobility […]