Authentication

Authentication | News, how-tos, features, reviews, and videos

Two developers collaborate on a project as they review code on a display in their workspace.
Conceptual image of a network labeled 'Zero Trust.'

passwords / passcodes

ReversingLabs adds new context-based, secret-detection capabilities

The software supply chain security tool will host new secret-detection capabilities through the command-line interface to help developers prioritize remediation efforts.

Person holding phone near a laptop while getting two-factor authentication info

Booking.com account takeover flaw shows possible pitfalls in OAuth implementations

Avoid these simple mistakes when setting up OAuth for third-party authentication to block unauthorized account access.

Person holding phone near a laptop while getting two-factor authentication info

Descope launches authentication and user management SaaS

Descope’s first product allows developers to build authentication and user management functions in applications.

social engineering fraud impersonation neon face with hoodie by photo by sebastiaan stam on unsplash

Threat actors abuse Microsoft’s “verified publisher” status to exploit OAuth privileges

Proofpoint discovers threat actors targeting verified status in the Microsoft environment to abuse OAuth privileges and lure users into authorizing malicious apps.

Many keys, one lock  >  Brute-force credential stuffing.

How passkeys are changing authentication

Well-implemented passkeys can improve the user experience and make it harder for cybercriminals to launch phishing and other attacks.

metaverse

The metaverse brings a new breed of threats to challenge privacy and security gatekeepers

If your organization isn’t already moving into the metaverse, it soon will be. Be warned: today’s security protocols and privacy laws may not apply to 3D worlds.

access control / authentication / privileges / security / key

Why it might be time to consider using FIDO-based authentication devices

Access codes sent by SMS or authenticator apps can be bypassed by clever phishing. Hardware-based tokens make that harder to do.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

8 top multi-factor authentication products and how to choose an MFA solution

Learn the key considerations when choosing an MFA solution and why these top picks are worth a look.

Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

Top considerations when choosing a multi-factor authentication solution

Choosing the right MFA solution for a Microsoft environment that covers all authentication needs will reduce stress on your IT admins and help desk.

Conceptual image of password entry amid binary code.

Dashlane launches new Dark Web Insights tool, MFA authenticator app, small biz Starter plan

Password manager vendor releases new credential security and support service features, along with a new low-cost option for small businesses.

A binary mask.

The deepfake danger: When it wasn’t you on that Zoom call

Deepfakes pose a real threat to security and risk management and it’s only going to get worse as the technology develops and bad actors can access malicious offerings such as deepfakes as a service.

Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

Multi-factor authentication fatigue attacks are on the rise: How to defend against them

LAPSUS$ is just one cybercriminal group that has breached networks of large companies such as Uber and Microsoft by spamming employees with MFA authentication requests.

The trouble with 2fa

With a large percentage of your workforce now working remotely, two-factor authentication (2fa) can make them (or your company data) safer online. But how you're doing it now probably isn't helping much at all.

12 famous passwords used through the ages

Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones.

enter neon sign do not tresspass privacy authentication access barbed wire by clem onojeghuo unspla

Intro to crypto wallet authentication

A blockchain enabled cybersecurity future is coming fast, with crypto wallets set to become a central authentication mechanism.

password azure protection security policy

How Azure Active Directory opens new authentication risks

Hybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes, as recently demonstrated for Azure AD.

A large 'X' marks a conceptual image of a password amid hexadecimal code.

Dashlane launches integrated passkey support for password manager with new in-browser passkey solution

Dashlane's passkey support allows users to authenticate to their password vaults without a password.

Zero-trust

What is zk-SNARK?

An intro to the most popular zero-knowledge protocol

Load More
You Might Also Like