Okta Warns of Credential Stuffing Attacks Using Tor, Residential Proxies

Okta warned of a spike in credential stuffing attacks using anonymizing services such as Tor, DataImpulse, Luminati, and NSocks.
The post Okta Warns of Credential Stuffing Attacks Using Tor, Residential Proxies appeared first on SecurityWeek.
Continue reading Okta Warns of Credential Stuffing Attacks Using Tor, Residential Proxies

Passwords, passkeys and familiarity bias

As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity. Most of us could be forgiven for not realizing passwordless authentication […]

The post Passwords, passkeys and familiarity bias appeared first on Security Intelligence.

Continue reading Passwords, passkeys and familiarity bias

Obtaining security clearance: Hurdles and requirements

As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense. Obtaining that clearance, however, is far from simple. […]

The post Obtaining security clearance: Hurdles and requirements appeared first on Security Intelligence.

Continue reading Obtaining security clearance: Hurdles and requirements

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

Identity Security Firm Silverfort Lands $116 Million Investment

Israeli late-stage startup Silverfort raises a whopping $116 million in new financing to scale its ambitions in the identity security space.
The post Identity Security Firm Silverfort Lands $116 Million Investment appeared first on SecurityWeek.
Continue reading Identity Security Firm Silverfort Lands $116 Million Investment

Oleria Secures $33M Investment to Grow ID Authentication Business

Seattle identity and authentication startup Oleria has attracted renewed interest from venture capital investors.
The post Oleria Secures $33M Investment to Grow ID Authentication Business appeared first on SecurityWeek.
Continue reading Oleria Secures $33M Investment to Grow ID Authentication Business