digital security

Cyberattacks Increasingly Going Mobile: Report

Cyberattacks Increasingly Going Mobile: Report

LexisNexis Risk Solutions has released a new Cybercrime Report that analyzes the most noteworthy cyber trends from the second half of 2019. The report noted that cybercrime is an international operation, and that a growing percentage of cyberattacks are now carried out across mobile channels. LexisNexis Risk Solutions observed that every single fraud network analyzed…

Verizon Unveils New Cybersecurity and Digital Identity Solutions

Verizon Unveils New Cybersecurity and Digital Identity Solutions

Verizon is expanding its security portfolio with a collection of new products that were designed to help companies guard against various forms of cybercrime. The new offerings included Verizon Managed Detection and Response (MDR), Verizon Identity (VID), and Verizon Machine State Integrity, in addition to an upgraded Rapid Response Retainer. So what do the new…

Thales Advises Companies to Be More Careful During Digital Transformation

Thales Advises Companies to Be More Careful During Digital Transformation

Thales has released its 2020 Data Threat Report, which suggests that organizations need to be more careful when going through a digital transformation. The report specifically found that companies that were the furthest along in their digital transformation were the most likely to have experienced a breach at some point in the past year. The…

FIDO Announces Keynote Speakers for Authenticate Conference

FIDO Announces Keynote Speakers for Authenticate Conference

The FIDO Alliance has finally shared the list of keynote speakers for the inaugural Authenticate conference in June. The organization first put out the call for speakers when Authenticate was announced back in September. Authenticate will be FIDO’s first attempt at organizing a major industry event, and is scheduled for June 2-3 at the Motif…

Thales Gets Common Criteria Certification for Mobile ID Security

Thales Gets Common Criteria Certification for Mobile ID Security

Global digital security firm Thales announced that it is the first company to achieve the highest international security standard ‘Common Criteria’ for its mobile ID software. The Common Criteria certification is an objective series of evaluations aimed at validating that a particular product or system meets a pre-defined level of security. Thales’ Gemalto Mobile ID…

Yubico Provides YubiKeys for Journalism Security Program at USC

Yubico Provides YubiKeys for Journalism Security Program at USC

Yubico has teamed up with the University of Southern California (USC) and Freedom of the Press to teach journalism students about the importance of digital security. The training course will focus on security best practices, and will be a mandatory part of the curriculum for the aspiring journalists at the USC Annenberg School for Communication…

Visa Token Service Participation Set to Reach $1 Trillion

Visa Token Service Participation Set to Reach $1 Trillion

Digital payments giant Visa has announced that participants in its Visa Token Service are set to reach an estimated $1 trillion in combined eCommerce transactions since the service was first introduced in late 2014. The Visa Token Service was launched as a way to replace a user’s sensitive account information with a unique digital identifier…

GoTrustID Moves Beyond USB with New Badge-Shaped Security Key

GoTrustID Moves Beyond USB with New Badge-Shaped Security Key

GoTrustID has released a new FIDO-certified security key with a unique badge form factor that was designed as an alternative to the more conventional USB option. The new Idem Card has Bluetooth and NFC capabilities, and is roughly the same size and shape as a standard credit card. The Idem Card can be used for…

Buguroo Explains How Behavioral Analytics Stops First and Second Party Fraud

Buguroo Explains How Behavioral Analytics Stops First and Second Party Fraud

Buguroo has provided a comprehensive breakdown of the different forms of fraud in a new blog post that classifies fraud into three separate categories. Third party fraud refers to fraud in which a cybercriminal targets a victim with no knowledge of the fraud taking place. That fraud can take many different forms, from phishing attacks…

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

Deloitte is trying to raise awareness about digital identity best practices while simultaneously calling attention to some of the main challenges facing businesses and other large organizations. The company notes that many organizations are still utilizing out of date legacy technology, and that those organizations will need to overcome institutional inertia in order to protect…

Buguroo Offers a Crash Course on Two-Step Authentication

Buguroo Offers a Crash Course on Two-Step Authentication

Buguroo has provided consumers with a handy primer that details the relative strengths and weaknesses of some of the most common forms of two-step authentication. The company notes that Strong Customer Authentication is a key component of new regulatory standards like PSD2, and will be increasingly important for companies and financial institutions that are hoping…

Majority of Brits are Ready to Ditch the Password: Survey

Majority of Brits are Ready to Ditch the Password: Survey

A majority of Brits are in favor of replacing passwords with biometric authentication, suggests new survey data from Equifax. Conducted by OnePoll in October, the Equifax-commissioned survey polled a representative sample of 2,000 adults in Great Britain on their attitudes toward biometrics. Fifty-seven percent of respondents said they would be happy to stop using passwords…

Former Director of U.S. National Economic Council Joins Hoyos Board

Former Director of U.S. National Economic Council Joins Hoyos Board

Hoyos Integrity Corporation (Hoyos) has announced Gary Cohn, the former Director of the U.S. National Economic Council and Chief Operating Officer of Goldman Sachs, as an investor and member of its Board of Advisors. Hoyos provides secure patent-protected mobile communications technologies to both the private and public sectors, and has its’ own FCC license to…

Trustonic and Lookout Team Up to Provide Better App Security

Trustonic and Lookout Team Up to Provide Better App Security

Lookout has partnered with Trustonic to expand the reach of its App Defense security platform. App Defense is an embeddable SDK that was built to reduce the threat of fraud and data breaches for consumer apps. The platform provides enterprise customers with more insight about malware and other security risks to their network. To that…

Okta Releases Enterprise-Level SecurityInsights Platform

Okta Releases Enterprise-Level SecurityInsights Platform

Okta has released two new security products designed for large enterprises. HealthInsight helps administrators monitor and manage their networks, while UserInsight enlists rank-and-file employees to help spot potential cyberattacks. Both products are being offered under the broader SecurityInsights umbrella. So what do the new products do? HealthInsights provides recommendations for security best practices, and monitors…

Survey Data Illustrates Worrying Cybersecurity Trends for SMBs

Survey Data Illustrates Worrying Cybersecurity Trends for SMBs

“… the survey data suggests that cyberattacks have increased dramatically compared to a base year of 2016: in the US, attacks shot up from 55 percent to 76 percent over that period.” New survey research from the Ponemon Institute is further illustrating the rise of digital security threats and conflicting attitudes about security among small…

Thales and Verint Publish Comprehensive Cyberthreat Handbook

Thales and Verint Publish Comprehensive Cyberthreat Handbook

Thales and Verint have joined forces to publish The Cyberthreat Handbook, a comprehensive guide to the international cybersecurity landscape. The Handbook examines approximately 60 major groups and 490 individual attack campaigns, offering details about the motive, methods, and targets of the world’s most prominent cybercriminals. The two companies are hoping that the Handbook will help…

Pages