Deloitte breach underlines need for better authentication

Computer Weekly

A breach of Deloitte’s email system, which may have exposed client details, emphasises the need for two-factor authentication and the monitoring of systems administrators

Lloyds Bank tests biometric authentication from Microsoft

Computer Weekly

Banking group is trying out enterprise-grade biometric authentication for its online customers

Identity, authentication and authorisation becoming risk-led

Computer Weekly

Identity management, and authentication and authorisation governance are shifting away from being purely IT initiatives, according to RSA

Singapore banks adopt voice biometrics for user authentication

Computer Weekly

Banks in Singapore are rolling out biometric technology to improve customer services by speeding up the authentication process

Second Factor Authentication With Security Keys

CTOvision

With the movement of our personal and business critical data to the ‘cloud’, and directed attacks on that data, many of us make use of stronger security through use two-factor authentication. Depending on which service, you use Google Authenticator, have a code sent via SMS, get a plain old phone call, the RSA key fob, or rely on email and then type your six digit code if you haven’t been logged out by that point.

TSB to introduce iris scan authentication in September 2017

Computer Weekly

TSB customers will soon be able to access their mobile bank accounts through iris scanning, which is regarded as the most secure biometric authentication available

Security Think Tank: Proceed with caution on biometric authentication

Computer Weekly

How can organisations move to biometric authentication of users without running the risk of exposing sensitive biometric information

Authenticity and the November 2013 Security Updates

IT Pros Rock!

Specifically, astrophysicist and geek icon Neil deGrasse Tyson has been critical about the movie''s authenticity. To deGrasse Tyson, a lack of authenticity disrupts the movie-going experience. Two advisories this month deal with authenticity by focusing on certificates and cryptography.

HSBC voice authentication tricked by twins

Computer Weekly

Twin brothers managed to trick HSBC’s voice recognition security system into giving account access to the wrong person

Two Factor Failure: With complexity comes new vulnerabilities

CTOvision

One of the most significant capabilities in the enterprise defensive arsenal is multi-factor authentication. Multi-factor defense helps solve many weaknesses of password authentication. Many two factor authentication systems have very glaring vulnerabilities.

Step-By-Step: Securing a Xamarin app with Azure AD’s Multi-factor Authentication

CanITPro

The solution proposed was to pause the application on a prompt and use Azure AD’s Multi-factor Authentication (MFA) to allow a valid administrator account to unlock the application and return to the available jobs screen. Select Multi-Factor Authentication (MFA).

Cisco Acquires Duo or How Should You Do 2 factor authentication (2FA)?

Forrester IT

link] From the license cost perspective moving away from SMS for example to Google Authenticator is minimal. NIST has not been recommending SMS OTP 2FA for a while precisely because of SMS inbox takeovers, MITM attacks, etc. Google publishes guides on how to do this [link] From the technical support perspective the process is marginally more expensive […]. age of the customer

TSB customers can use their faces to authenticate payments

Computer Weekly

Bank’s latest addition to its mobile apps is a facial recognition option for Apple iPhone X users

How to set up ssh key authentication

Tech Republic Security

With the help of ssh key authentication, you can lock down secure shell so that only specific machines can log in. Out of the box, secure shell is fairly secure. Here's how

Facebook ups security with Fido U2F two-factor authentication

Computer Weekly

Social media giant is enabling users to increase the security of their logins with Fido U2F USB security keys

An Authentic Culture

Future of CIO

An organization with an authentic culture can inspire openness, innovation and motivational. So what are the fundamental elements to build an authentic culture in order to run a high-valuable and high-mature digital organization?

NIST Recommends Against SMS for Factor Authentication

IT Toolbox

Do you use your cell phone to complete 2-Factor Authentication to digital services? In many ways it is the easiest second channel or Out Of Band (to use the technical term) channel for most of us in the 2nd decade of the 21st century. After all, if you're accessing a digital service in the first place, you probably have a cell phone no farther away than your pocket. However

Upgrade Your Cybersecurity in 2017: Why You Need Two-Factor Authentication

ITGCT

In an era where the stakes are this high, techniques like two-factor authentication are among the best chances you have of keeping your digital information away from prying eyes. Two-factor authentication is gaining popularity quickly for good reasons. What is Two-Factor Authentication?

Buyer’s Guide to 9 multi-factor authentication products

Network World

Multi factors Since we last reviewed two-factor authentication products , the market has moved beyond two-factor authentication toward what is now being called multi-factor authentication.

Step-By-Step: Enabling Multi-Factor Authentication on XBOX ONE

CanITPro

Step-By-Step XBOX 360 authentication Xbox One multi-factor Anthony Bartolo XBOXE3 two-factor XBOX Security E32015 E3 Windows 10 how-toMuch of this week’s online news has been centered on the E3 event taking place in LA.

Step-By-Step: enable Multi-Factor Authentication in Azure

CanITPro

Step-By-Step Cloud Azure Pierre Roman MFA Active Directory multi-factor authentication Hello Folks, lately I’ve been covering Azure and active directory pretty often.

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Network World

billion deal it made for network identity, authentication security company Duo. Cisco said today it had closed the $2.35 According to Cisco, Duo’s zero trust security model authorizes secure connections to all applications based on the trustworthiness of users and devices. Duo’s cloud-delivered technology lets IT professionals set and enforce risk-based, adaptive access policies and get enhanced visibility into users’ devices and activities.

8 Steps for Using Azure AD Service Principal Certificate Authentication with Azure Automation PowerShell Workflow Runbooks

IT Pros Rock!

As part of this process, runbooks need to securely authenticate to Azure with a minimum of administration overhead. Step 6: Test authenticating as Service Principal. If you’re unable to successfully authenticate, go back to Step 1 and confirm each of the previous steps again. #

Upgrade Your Cybersecurity in 2017: Why You Need Two-Factor Authentication

ITGCT

In an era where the stakes are this high, techniques like two-factor authentication are among the best chances you have of keeping your digital information away from prying eyes. Two-factor authentication is gaining popularity quickly for good reasons. In addition, two-factor authentication is inexpensive and easy to use. Before you begin to use two-factor authentication for your own business, however, there are a few key things you should know and consider.

Why you need a strong authentication platform

Network World

According to Symantec ’s annual Internet Security Threat Report , up to 80 percent of breaches could be eliminated with strong authentication. Common challenges Image by Pexels As the security landscape is changing, so are the business challenges that organizations are facing.

Continuous Authentication: The future of Identity and Access Management (IAM)

Network World

Insert another authentication step on top of these credentials and this gateway becomes harder to infiltrate. But once access is gained, how can the device or Web application be certain that the authenticated user is, in fact, the same person throughout the entire session? Or more commonly, you may hand the device to a colleague – a non-authenticated user – trusting they won’t do anything nonsensical or malicious.

Step-By-Step: Enabling Multi-Factor Authentication for Azure Active Directory Users

CanITPro

Multi-factor authentication (MFA) provides an additional layer of security to confirm the identity of a user. This Step-By-Step post will demonstrate how easy it is to enable multi-factor authentication for Azure Active Directory users.

How to add two-factor authentication to your WordPress site

Tech Republic Security

If you employ WordPress for your personal or company sites, you owe it to yourself to set up two-factor authentication. Here's how

UK to invest $2.3B in cybersecurity, calls for stronger authentication

Tech Republic Security

Over the next five years, the UK government will invest heavily in cybersecurity, including new authentication methods such as Fast IDentity Online (FIDO

5 trends shaking up multi-factor authentication

Network World

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. In our review three years ago of two-factor authentication products , the hot new approach was using smartphones as an authentication method via soft tokens, which could be a smartphone app, SMS message or telephony.

How to enable two-factor authentication on Instagram

Tech Republic Security

Instagram recently made two-factor authentication available to all of its users. Here's how you can use it to add an extra layer of security to your account

How to enable two-step authentication in Dropbox

Tech Republic Security

For an added layer of protection, follow this process of setting up two-step authentication in Dropbox Concerned about the security of your Dropbox account?

Step-by-Step: Get Started with Windows Azure Active Directory (WAAD) and Multi-Factor Authentication

IT Pros Rock!

Luckily, Windows Azure gives us the ability to easily gain visibility and centralized control over "cloud era" identity management via two offerings: Windows Azure Active Directory (WAAD) and Windows Azure Multi-Factor Authentication (MFA).

IBM Claims Advances In Fully Homomorphic Encryption (and I’m claiming advances in an anti-gravity device)

CTOvision

IBM has a tradition of making major cryptography breakthroughs, such as the design of the Data Encryption Standard (DES); Hash Message Authentication Code (HMAC); the first lattice-based encryption with a rigorous proof-of-security; and numerous other solutions that have helped advance data security.

Advances in multifactor authentication (MFA) technologies

Network World

Enterprises authenticate users based on their knowledge, possession, or inherence of some evidence that they are the party with the given right of access. Some experts see the context of the user’s authentication such as the time, their network IP and device, and their location as the fourth factor of authentication. Stephen Cobb, senior security researcher at ESET says you can assure greater security with each additional factor of authentication that you add.