The U.S. government could be a year away from allowing citizens to use the same authentication credentials to get services from multiple departments and agencies, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
Israeli Prime Minister Benjamin Netanyahu may have been a bit premature to claim Israel has deployed a cyber "iron dome" to protect its critical IT and defense systems. But a new initiative under way will try to do just that.
Amidst a year of high-profile and costly data breaches, what can organizations be doing to help ensure they aren't the next victims? Charley Chell of CA Technologies discusses new authentication solutions.
Initial reports suggested that Russian hackers could behind an attack against JPMorgan Chase, and perhaps other U.S. banks. While it's still far from clear who the culprits are, experts discuss the potential hacking motivations of a nation-state.
The killing of an unarmed teen by police in Ferguson, Mo., has Anonymous sympathizers disagreeing on Twitter when and how to expose the identity of the shooter.
Visa's new intelligent analytics service aims to help gas stations reduce card. But experts say the service could reduce fraud for other merchants, too, and bridge the gap between the mag-stripe and EMV.
A report that Russian hackers have hoarded 1.2 billion stolen passwords could prove to be an important catalyst for beefing up information security. Experts analyze the potential impact.
Millions of user credentials are breached regularly - whether we hear of the incidents or not. So, why do we continue to rely on passwords? Derek Manky of Fortinet discusses authentication and data retention.
The hacker community can be a cynical crowd, or perhaps a realistic one, that tries to make the best of the threats confronting society. CISO Dan Geer, for example, prefers to hire security folks who are, more than anything else, sadder but wiser.
A report that a Russian hacker group dubbed "CyberVor" is hoarding more than 1 billion stolen passwords triggered worldwide concern, but security experts caution that scant details have been revealed, making the threat tough to judge.
Peruse the agenda for the Black Hat security conference that's being held this week in Las Vegas and you'll get a peek at some of the major cybersecurity challenges ahead - and potential solutions.
It's unlikely that the downing of a Malaysian airliner by an anti-aircraft missile over Ukraine and the air and land battles in Gaza could expand into a cyberwar. Here's why.
Using big data to fight fraud is a challenge for most organizations. Andreas Baumhof of ThreatMetrix explains how context-based authentication combines fraud and security to leverage the use of big data.
A new study shows the accuracy of facial recognition algorithms has markedly improved over the past three years, though one of the report's authors suggests they're not at the level to be a highly reliable form of authentication.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.