Authentication
Hang up the Phone: MFA’s Insecure Reliance on SMS
It’s hard enough to get people to use multi-factor authentication (MFA)—you know, something you know, you have and you are. Most websites, email accounts and other devices are secured (if at all) ...
Security Boulevard
Identity Verification: Is Your Potential Employee Who They Say They Are?
Identity verification has taken on a new urgency for cybersecurity and IT teams in the new era of remote work. Confirming a person’s identity has been important since the advent of data ...
Security Boulevard
The Most Secure RADIUS VPN Authentication Method
Due to the COVID-19 pandemic, more employees are working from home now more than ever before. According to a Stanford study, an incredible 42 percent of the U.S. labor force now works ...
Problems Facing IT Departments
Jake Ludin | | Authentication, certificate authentication, Cloud Security, consumer protection, helpdesk, IT, support tickets, Tech Trends
No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find cost effective ...
A WebLogic Vulnerability Highlights the Path-Based Authorization Dilemma
A WebLogic server vulnerability fixed by the October CPU has come under active exploitation after a Vietnamese language blog post detailed the steps needed to bypass authentication and achieve remote code execution ...
Behavioral Biometrics: People-Friendly Zero Trust
Behavioral biometrics bring a better user experience to authentication COVID-19 may very well redefine our work, our homes, our very lives for the foreseeable future. As we near the end of 2020, ...
Security Boulevard
Catch Me If You Can: How to Protect Your Identity in the Modern Era
When Leonardo DiCaprio played famed conman Frank Abagnale, it awakened many in the con experience. In the movie Catch Me If You Can, DiCaprio (as Abagnale) conned flight attendants (pretending to be ...
Defending an Increasingly Blurred Perimeter with ZTNA and SASE
Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was ...
How Startups Build Effective Cybersecurity Programs
A data breach can spell disaster for a startup. Compliance violation fines can cripple a business, and damage to brand value can result in business irrelevance. So it’s vital to take a ...
Security Boulevard
New Bluetooth Vulnerability
Bruce Schneier | | Authentication, bluetooth, iPhone, man in the middle attacks, patching, Uncategorized, Vulnerabilities
There’s a new unpatched Bluetooth vulnerability: The issue is with a protocol called Cross-Transport Key Derivation (or CTKD, for short). When, say, an iPhone is getting ready to pair up with Bluetooth-powered ...

