Identity Management
Digital Identification: The Cornerstone for Confidence Online
By combining different digital identity technologies, organizations can withstand the deceptive tactics of cybercriminals ...
Security Boulevard
Cisco Zero-Day: As Bad as it Gets — and No Fix 4 Weeks in
Richi Jennings | | 0-day, 0-day exploits, 0-day vulnerability, 0day, cisco, Cisco IOS XE, CVE-2023-20198, SB Blogwatch, Zero Day Attacks, zero-day, Zero-Day Bug, Zero-day Exploit, zero-day exploits, zero-day flaw, zero-day flaws, zero-day threat, zero-day vulnerabilities, Zero-day Vulnerability, zero-days, zeroday, zerodayvulnerabilities
Keeping us in suspense—It doesn’t get worse than this: CVE-2023-20198 is CVSS=10 ...
Security Boulevard
Taking Stock of Identity Solutions in the Age of AI
Branden Williams | | Artificial Intelligence, Cybersecurity, Decentralized Identity, identity threat detection and response, Identity Verification
Security pros can use ITDR and DCI in conjunction to combat security threats in the age of AI ...
Security Boulevard
JumpCloud Adds Passwordless Authentication to Open Directory Platform
Michael Vizard | | Authentication, biometric, identity and access management, JumpCloud, passwordless
JumpCloud Inc. today updated its Open Directory platform to include support for a passwordless login capability, dubbed JumpCloud Go ...
Security Boulevard
Master Your Passwords
Every month millions of people have their passwords stolen. Here we explain how to keep your passwords secure | Originally written for F-Secured - Your complete guide to online security in 2023 ...
Survey Sees Shift to Passwordless Authentication Accelerating
A survey of 1,005 IT decision-makers published today found 89% expected their organizations to use passwords for less than 25% of logins within five years ...
Security Boulevard
Build Vs. Buy: The Unknown Unknowns of FIDO-Based Passkeys
There are many unknown unknowns associated with building a FIDO-based passkey solution versus adopting off-the-shelf solutions ...
Security Boulevard
Stalking: Fear of Apple AirTag ‘Explodes’ — Lawsuit Momentum Grows
Richi Jennings | | AirTag, AirTags, Apple, Apple AirTag, cyberstalking, Digital Stalking, Find My iPhone, SB Blogwatch, Stalkerware, Stalking, Stalkware, Tracker Detect, trackers
This is why we can’t have nice things: 38 victims of Apple’s “negligence” named in amended class action ...
Security Boulevard
Cybersecurity Insights with Contrast CISO David Lindner | 10/13
David Lindner, Director, Application Security | | AI, cisa, CISO, Cybersecurity, google, Known Exploited Vulnerabilities, Passkeys, passwords, Thought Leaders, Vulnerabilities
Insight #1 Google is now defaulting to the use of passkeys for authentication. This is a huge step in increasing the strength of the authentication mechanism out of the box for users, ...
Hackers Still Abusing LinkedIn Smart Links in Phishing Attacks
Email security firm Cofense in 2022 uncovered a phishing campaign that abused LinkedIn’s Smart Links feature to redirect unsuspecting victims to malicious websites, another example of bad actors using a trusted source ...
Security Boulevard