Zero-Trust Frameworks: Securing the Digital Transformation

Zero trust refers to the notion of evaluating  the security risk of devices and users within the context of any given moment, without automatically conferring access based on credentials. Continue reading Zero-Trust Frameworks: Securing the Digital Transformation

Windows Credential Guard protects credentials but not the remote access with the same credentials?

I wonder what is the real purpose of having credentials protected by Windows Credential Guard (WCG) when it is possible for malicious admin to obtain cached credentials (i.e. the ones not protected by WCG) and request WCG to … Continue reading Windows Credential Guard protects credentials but not the remote access with the same credentials?

Why is Windows Credential Guard secure, when Windows is able to "access" credentials using RPC?

I’ve read some blogs that describe Windows Credential Guard: how it works and which security benefits it provides.

However, some of them mention that Windows can “access” credentials using RPC calls to Virtual Secure Mode (… Continue reading Why is Windows Credential Guard secure, when Windows is able to "access" credentials using RPC?

Chip Cards Fail to Reduce Credit Card Fraud in the US

A new study finds that credit card fraud has not declined since the introduction of chip cards in the US. The majority of stolen card information comes from hacked point-of-sale terminals. The reasons seem to be twofold. One, the US uses chip-and-signature instead of chip-and-PIN, obviating the most critical security benefit of the chip. And two, US merchants still accept… Continue reading Chip Cards Fail to Reduce Credit Card Fraud in the US

Half a Million People Potentially Affected by Data Breach at Bankers Life

A data breach at Bankers Life might have compromised the personally identifiable information of over half a million people. On 25 October 2018, Fortune 1000 company CNO Financial Group, Inc. submitted a report to the Office for Civil Rights’ Brea… Continue reading Half a Million People Potentially Affected by Data Breach at Bankers Life

How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?

By embracing the dervied credentials approach to personal identity verification, companies can deliver strong authentication, scalability, adherence to NIST guidelines, and ease of use and deployment.

The post How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices? appeared first on Security Intelligence.

Continue reading How Can Highly Regulated Industries Achieve Strong Authentication Via Mobile Devices?