IT Brief UK - Technology news for CIOs & IT decision-makers

Multi-factor authentication (MFA) stories - Page 17

Story image
Around 17 million websites are already powered by WordPress - are they secure?
Thu, 20th Apr 2017
#
passwords
#
wordpress
#
mfa
WordPress, the most popular and most used content management system, is also a great tool for businesses and individuals.
Story image
Microsoft launches ‘phone signin’ for Android and iOS - but what about its Windows Phone?
Thu, 20th Apr 2017
#
biometrics
#
microsoft
#
passwords
Microsoft has launched 'phone sign-in’ specifically for Microsoft accounts on Android and iOS - but what about Windows Phones?.
Story image
Identity theft - have you ever pen tested procedures?
Mon, 20th Mar 2017
#
devops
#
apm
#
software development
There is a focus on technical aspects of penetration tests, network and application security, while the chain is only as strong as its weakest link.
Story image
Centrify expands mobile security offerings across ANZ
Mon, 6th Mar 2017
#
iam
#
centrify
#
mfa
Centrify has expanded its ANZ suite of mobile security offerings, and the company says both Windows and Apple-based devices can now get in on the fun.
Story image
Palo Alto amplifies endpoint platform to tackle credential theft
Wed, 8th Feb 2017
#
firewalls
#
network infrastructure
#
network security
Credential abuse and theft are two main ways threat actors are able to compromise and move within an organisation to steal valuable assets.
Story image
Centrify recognised for cloud computing security excellence
Wed, 9th Nov 2016
#
cloud security
#
cybersecurity
#
centrify
Centrify's Centrify Identity Service (CIS) has won the 2016 Cloud Computing Security Excellence Award for Cloud Security.
Story image
Duo adds next-gen 'human' MFA identity access management offering to lineup
Wed, 19th Oct 2016
#
duo
#
linkedin
#
mfa
Duo is hoping to help resellers break ‘the circle of compromise’ with the signing of a distie deal for NoPassword multi-factor authentication IAM.
Story image
Multi-factor authentication to be the norm by 2020
Mon, 2nd May 2016
#
cybersecurity
#
unified computing
#
smb
Multi-factor authentication has become commonplace as a number of industries, particularly the govt sector, is looking to strengthen security measures.
Story image
Compromised credentials a leading point of attack in data breaches
Fri, 22nd Apr 2016
#
cloud security
#
breach prevention
#
cybersecurity
Survey shows compromised credentials contribute to nearly a quarter of data breaches, pushing companies to extend access control policies to third parties.
Story image
Big things are on the horizon for biometrics security
Wed, 23rd Mar 2016
#
surveillance
#
biometrics
#
cybersecurity
Biometrics industry to reach $30bn by 2021, driven by fingerprint sensors and facial recognition, says ABI Research.
Story image
ESET: Two-factor authentication crucial in today's world
Wed, 16th Mar 2016
#
malware
#
cybersecurity
#
passwords
ESET has officially announced a new version of its secure, mobile-based two-factor authentication system, ESA 2.4.
Story image
Centrify ups fight against enterprise attacks with 'MFA Everywhere'
Wed, 2nd Mar 2016
#
iaas
#
centrify
#
mfa
Centrify has launched a new initiative to secure enterprise identities against the most prevalent source of cyber attacks - compromised credentials.
Story image
Cloud IAM providing high growth potential
Thu, 28th Jan 2016
#
iam
#
allied market research
#
mfa
Cloud IAM market set to soar, with a 26.2% CAGR predicted by 2020, led by multi-factor authentication and Asia Pacific growth.
Story image
MFA quickly becoming the most popular form of authentication
Wed, 26th Aug 2015
#
uc
#
data protection
#
dr
Businesses are increasingly adopting multi-factor authentication amidst rising data breaches, moving away from traditional security questions.
Story image
Cybercrims bypassing two-factor authentication with simple txt
Thu, 18th Jun 2015
#
cybersecurity
#
symantec
#
mfa
Strong passwords and two-factor authentication are no match for simple social engineering, with Symantec warning of a new password recovery scam.
Story image
Users want proactive not reactive security solutions
Tue, 13th Jan 2015
#
ddos
#
data analytics
#
cloud security
Throughout 2014 there were an increasing number of high profile cyber security threats and breaches, and response is the difference between success and failure.
Story image
The App is King
Fri, 1st Oct 2010
#
virtualisation
#
firewalls
#
data protection
With the rise of cloud computing, traditional security measures falter, making secure application development essential—The app is now king.