Okta F5 Alkira zero-trust Secure Cloud AccessTeleport cloud incident response automation cloud security cloud data protection Oracle cloud security Bridgecrew misconfigurations Palo Alto Networks public cloud

Okta Adds Security Center to Provide Real-Time Threat Visibility

Okta this week made available Security Center, an extension of the Okta Customer Identity Cloud that provides a real-time view of authentication events, potential security incidents and threat response efficacy. Ian Hassard, ...
Security Boulevard
digital identity IGA driver's license identity verification

Protecting the Future of Digital Identities

In recent years, digital identities have gained popularity and have been implemented by many national governments to serve as the basis of our modern digital society. In the near future, we can ...
Security Boulevard
PCI-DSS PayPal Visa AI digital payments Security the Price of Convenience in Supply Chain Payments

PayPal Credential Stuffing Attacks Renew Calls for MFA

An internal review confirmed that on December 20, 2022, unauthorized parties could use account holders’ login credentials to access their PayPal accounts. In response to what is being called a credential stuffing ...
Security Boulevard
Why are Phone Numbers Used for Identification? Hacker Summer Camp Advice, Samsung Repair Mode

Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode

Why your phone number is becoming a popular way to identify you, our advise on how to best protect your privacy at hacker summer camp in Las Vegas (BSides, BlackHat, DEF CON), ...
Authentication, Identity Verification, and Identification: What's the Difference

Authentication, Identity Verification, and Identification: What’s the Difference

People usually consider authentication, id verification, and identification the same thing, but they are entirely different when we see stuff through the lens of information security experts. Learn the fundamental differences between ...

Tracking People via Bluetooth on Their Phones

We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not ...
Age of No-Code Technologies: Identification and Authentication

Age of No-Code Technologies: Identification and Authentication

No code is a process of developing applications through a graphical interface that requires zero coding. All you need to know is your requirements and you are ready to go. Let’s take ...

I Am Not Satoshi Nakamoto

This isn’t the first time I’ve received an e-mail like this: Hey! I’ve done my research and looked at a lot of facts and old forgotten archives. I know that you are ...

Identifying the Person Behind Bitcoin Fog

The person behind the Bitcoin Fog was identified and arrested. Bitcoin Fog was an anonymization service: for a fee, it mixed a bunch of people’s bitcoins up so that it was hard ...
behavioral biometrics

Behavioral Biometrics: People-Friendly Zero Trust

Behavioral biometrics bring a better user experience to authentication COVID-19 may very well redefine our work, our homes, our very lives for the foreseeable future. As we near the end of 2020, ...
Security Boulevard

Cloud Capabilities Poll