Surveillance through Push Notifications

The Washington Post is reporting on the FBI’s increasing use of push notification data—”push tokens”—to identify people. The police can request this data from companies like Apple and Google without a warrant ...
digital identity, organizations, IGA driver's license identity verification

Digital Identification: The Cornerstone for Confidence Online

By combining different digital identity technologies, organizations can withstand the deceptive tactics of cybercriminals ...
Security Boulevard
organization, zero-trust, trust supply chain third-party

Zero-Trust in the Cloud is Hard. Here’s How to Do it Right

A zero-trust security framework is quickly becoming a necessity. Here are a few tips to implement it successfully ...
Security Boulevard
Lacework ABAC Axiomatics Cado Okta F5 Alkira zero-trust Secure Cloud AccessTeleport cloud incident response automation cloud security cloud data protection Oracle cloud security Bridgecrew misconfigurations Palo Alto Networks public cloud

Okta Adds Security Center to Provide Real-Time Threat Visibility

Okta this week made available Security Center, an extension of the Okta Customer Identity Cloud that provides a real-time view of authentication events, potential security incidents and threat response efficacy. Ian Hassard, ...
Security Boulevard
digital identity, organizations, IGA driver's license identity verification

Protecting the Future of Digital Identities

In recent years, digital identities have gained popularity and have been implemented by many national governments to serve as the basis of our modern digital society. In the near future, we can ...
Security Boulevard
PCI-DSS PayPal Visa AI digital payments Security the Price of Convenience in Supply Chain Payments

PayPal Credential Stuffing Attacks Renew Calls for MFA

An internal review confirmed that on December 20, 2022, unauthorized parties could use account holders’ login credentials to access their PayPal accounts. In response to what is being called a credential stuffing ...
Security Boulevard
Why are Phone Numbers Used for Identification? Hacker Summer Camp Advice, Samsung Repair Mode

Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode

Why your phone number is becoming a popular way to identify you, our advise on how to best protect your privacy at hacker summer camp in Las Vegas (BSides, BlackHat, DEF CON), ...
Authentication, Identity Verification, and Identification: What's the Difference

Authentication, Identity Verification, and Identification: What’s the Difference

People usually consider authentication, id verification, and identification the same thing, but they are entirely different when we see stuff through the lens of information security experts. Learn the fundamental differences between ...

Tracking People via Bluetooth on Their Phones

We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not ...
Age of No-Code Technologies: Identification and Authentication

Age of No-Code Technologies: Identification and Authentication

No code is a process of developing applications through a graphical interface that requires zero coding. All you need to know is your requirements and you are ready to go. Let’s take ...