article thumbnail

This Open-Source Security Key Helps You Ditch Software Authenticators

Gizmodo

Accidentally deleting your Google Authenticator app is a nightmare. The app, which generates one-time codes for many websites, is usually your key to many major email services, including Gmail, domain name services like Namecheap, and even banking services. If you forget to move these codes over to a new phone when… Read more.

article thumbnail

Top 5 Security Trends for CIOs

CIO Business Intelligence

Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. Most commercial enterprise software products and nearly all open-source ones depend upon numerous software packages and libraries.

Trends 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Configuration as code: securing the cloud

TM Forum

Configuration as code is the best available approach to secure and modernize cloud infrastructure. Thousands of settings must be maintained to establish policy for how employees authenticate and interact with company data. Configuration as code provides automation to maintain security policies in cloud infrastructure.

Cloud 130
article thumbnail

The High-Stakes Game of Ensuring IoMT Device Security

SecureWorld News

New security solutions are now aiding healthcare organizations' IT teams in promptly resolving issues, even with devices from various manufacturers. Let's examine common security challenges in connected healthcare equipment and discuss some effective protection strategies and recommendations.

Security 101
article thumbnail

SoloKeys Solo V2 is an easy and quick way to improve your personal cybersecurity

Tech Republic Security

The security key is built on open source hardware and firmware, making it a universal factor authentication device instead of a two-factor authentication device.

article thumbnail

Heptio founder leads Stacklok, a new software supply chain startup that just raised $17.5M

GeekWire

(Stacklok Photo) A pair of cloud computing vets are jumping back into entrepreneurship with a new startup that helps enterprises vet software supply chains amid a rise in cyber-breaches stemming from open-source code. Hinds is the project founder of Sigstore, a tool to verify and authenticate software artifacts.

article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

In the early days of production systems built around Apache Hadoop, security was only possible by limiting access to your cluster. Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Then some very positive things started happening.

Security 272