Passwordless Authentication Is Here: What Do You Need to Know?

Passwords are becoming a dying breed. In a recent article from Microsoft, they announced that they are putting aside their decades-old practice of forcing users to sign in with a password to use the business and personal applications suite — one of the most popular software packages on earth. Passwordless authentication is becoming the new […]

The post Passwordless Authentication Is Here: What Do You Need to Know? appeared first on Security Intelligence.

Continue reading Passwordless Authentication Is Here: What Do You Need to Know?

Multi-factor authentications soar as enterprises move away from passwords to secure hybrid workers

Enterprises are taking steps to move away from passwords and adopting low-friction authentication methods to protect the hybrid workforce, a Cisco’s Duo Security report reveals. Multi-factor authentications increased significantly While the total… Continue reading Multi-factor authentications soar as enterprises move away from passwords to secure hybrid workers

Organizations failing to give users the login experience they want

Companies often claim to be customer-centric, or even customer-obsessed, striving to offer technologies that their users demand. However, the findings of a recent global Auth0 survey suggest that organizations worldwide continue to miss the mark when i… Continue reading Organizations failing to give users the login experience they want

Microsoft announces passwordless authentication option for consumers

After offering the passwordless authentication option to enterprise customers in March 2021, Microsoft has now started rolling it out to its consumer segment of users. The Passwordless account option “Beginning today, you can now completely remov… Continue reading Microsoft announces passwordless authentication option for consumers

Hybrid work: How do you secure every identity on your network?

As organizations around the world continue optimizing their hybrid work environments, many are struggling to stay productive without compromising on security. In this interview with Help Net Security, Ben King, Chief Security Officer EMEA / APAC, Okta,… Continue reading Hybrid work: How do you secure every identity on your network?

Most employees reusing personal passwords to protect corporate data

Nearly two thirds of employees are using personal passwords to protect corporate data, and vice versa, with even more business leaders concerned about this very issue. Surprisingly, 97% of employees know what constitutes a strong password, yet 53% admi… Continue reading Most employees reusing personal passwords to protect corporate data

No More Passwords! What is a Zero Trust Security Model?

Is your company getting to grips with the zero-trust security conundrum? A recent data threat report revealed, totally unsurprisingly, that the pandemic-driven shift to large scale remote working had led to 44% of security teams not being confident in … Continue reading No More Passwords! What is a Zero Trust Security Model?

How to prevent corporate credentials ending up on the dark web

A little over $3,000 — that’s how much stolen corporate network credentials tend to go for on the dark web. Although the exact asking price for an individual’s credentials may depend on several factors, like how much revenue their enterprise make… Continue reading How to prevent corporate credentials ending up on the dark web

Why passwordless is not always passwordless

The concept of passwordless authentication has been gathering steam. Gartner anticipates that by 2022, 60% of large and global enterprises will implement some sort of passwordless solution to enhance security. While these emerging authentication tools … Continue reading Why passwordless is not always passwordless

Beyond MFA: Adding Context For Secure Access

The pandemic forced most businesses globally to transition to remote work. With many people working from home, any semblance of a corporate security perimeter evaporated, increasing demand for virtual private networks (VPNs) and multifactor authentica… Continue reading Beyond MFA: Adding Context For Secure Access