digital security

GoTrustID Moves Beyond USB with New Badge-Shaped Security Key

GoTrustID Moves Beyond USB with New Badge-Shaped Security Key

GoTrustID has released a new FIDO-certified security key with a unique badge form factor that was designed as an alternative to the more conventional USB option. The new Idem Card has Bluetooth and NFC capabilities, and is roughly the same size and shape as a standard credit card. The Idem Card can be used for…

Buguroo Explains How Behavioral Analytics Stops First and Second Party Fraud

Buguroo Explains How Behavioral Analytics Stops First and Second Party Fraud

Buguroo has provided a comprehensive breakdown of the different forms of fraud in a new blog post that classifies fraud into three separate categories. Third party fraud refers to fraud in which a cybercriminal targets a victim with no knowledge of the fraud taking place. That fraud can take many different forms, from phishing attacks…

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

Deloitte is trying to raise awareness about digital identity best practices while simultaneously calling attention to some of the main challenges facing businesses and other large organizations. The company notes that many organizations are still utilizing out of date legacy technology, and that those organizations will need to overcome institutional inertia in order to protect…

Buguroo Offers a Crash Course on Two-Step Authentication

Buguroo Offers a Crash Course on Two-Step Authentication

Buguroo has provided consumers with a handy primer that details the relative strengths and weaknesses of some of the most common forms of two-step authentication. The company notes that Strong Customer Authentication is a key component of new regulatory standards like PSD2, and will be increasingly important for companies and financial institutions that are hoping…

Majority of Brits are Ready to Ditch the Password: Survey

Majority of Brits are Ready to Ditch the Password: Survey

A majority of Brits are in favor of replacing passwords with biometric authentication, suggests new survey data from Equifax. Conducted by OnePoll in October, the Equifax-commissioned survey polled a representative sample of 2,000 adults in Great Britain on their attitudes toward biometrics. Fifty-seven percent of respondents said they would be happy to stop using passwords…

Former Director of U.S. National Economic Council Joins Hoyos Board

Former Director of U.S. National Economic Council Joins Hoyos Board

Hoyos Integrity Corporation (Hoyos) has announced Gary Cohn, the former Director of the U.S. National Economic Council and Chief Operating Officer of Goldman Sachs, as an investor and member of its Board of Advisors. Hoyos provides secure patent-protected mobile communications technologies to both the private and public sectors, and has its’ own FCC license to…

Trustonic and Lookout Team Up to Provide Better App Security

Trustonic and Lookout Team Up to Provide Better App Security

Lookout has partnered with Trustonic to expand the reach of its App Defense security platform. App Defense is an embeddable SDK that was built to reduce the threat of fraud and data breaches for consumer apps. The platform provides enterprise customers with more insight about malware and other security risks to their network. To that…

Okta Releases Enterprise-Level SecurityInsights Platform

Okta Releases Enterprise-Level SecurityInsights Platform

Okta has released two new security products designed for large enterprises. HealthInsight helps administrators monitor and manage their networks, while UserInsight enlists rank-and-file employees to help spot potential cyberattacks. Both products are being offered under the broader SecurityInsights umbrella. So what do the new products do? HealthInsights provides recommendations for security best practices, and monitors…

Survey Data Illustrates Worrying Cybersecurity Trends for SMBs

Survey Data Illustrates Worrying Cybersecurity Trends for SMBs

“… the survey data suggests that cyberattacks have increased dramatically compared to a base year of 2016: in the US, attacks shot up from 55 percent to 76 percent over that period.” New survey research from the Ponemon Institute is further illustrating the rise of digital security threats and conflicting attitudes about security among small…

Thales and Verint Publish Comprehensive Cyberthreat Handbook

Thales and Verint Publish Comprehensive Cyberthreat Handbook

Thales and Verint have joined forces to publish The Cyberthreat Handbook, a comprehensive guide to the international cybersecurity landscape. The Handbook examines approximately 60 major groups and 490 individual attack campaigns, offering details about the motive, methods, and targets of the world’s most prominent cybercriminals. The two companies are hoping that the Handbook will help…

CyberPeace Institute Formed to Help the Victims of International Cyberattacks

CyberPeace Institute Formed to Help the Victims of International Cyberattacks

Some of the world’s leading cybersecurity and international policy experts have joined forces to create the CyberPeace Institute, a new NGO that will seek to mitigate the effects of major cyberattacks. Stéphane Duguin will come on as the organization’s CEO, while Marietje Schaake will serve as President and Chair of the Advisory Board. Together, they…

OneLogin Launches New Behavioral Risk Assessment Platform

OneLogin Launches New Behavioral Risk Assessment Platform

OneLogin has unveiled a pair of new cybersecurity products to help large enterprises calculate risk and reduce their reliance on text-based passwords. Vigilance AI is a risk assessment engine that uses machine learning and AI to determine the threat level of a given interaction, while SmartFactor Authentication uses behavioral analytics to verify people’s identities without…

NIST Invites Comment on Draft Privacy Framework

NIST Invites Comment on Draft Privacy Framework

Seeking to help delineate a middle ground between privacy protections and data collection, the National Institute of Standards and Technology (NIST) has published a preliminary draft of its major new set of guidelines. Called the NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management, the publication has been posted in the Federal…

Google Security Researchers Detail Major Attack Against iPhone Users

Google Security Researchers Detail Major Attack Against iPhone Users

Thousands of iPhone users may have had their devices hacked by malicious code found in a handful of websites, according to security researchers with Google. The security vulnerability has been revealed through a new blog post from Google’s Project Zero team member Ian Beer. The post describes a small group of websites that were likely…

IoT Botnet Targets Android Smart TVs and Set-Top Boxes

IoT Botnet Targets Android Smart TVs and Set-Top Boxes

The device security company WootCloud has uncovered an IoT botnet that targets Android set-top boxes and TVs. Dubbed “Ares”, the botnet specifically takes advantage of the Android Debug Bridge (ADB) infrastructure, which is a communications component that allows for the remote management of Android devices. WootCloud was able to discover the botnet with the help…

Payments Professionals Are Worried About Cybersecurity Yet Mistrustful of Experts: Survey

Payments Professionals Are Worried About Cybersecurity Yet Mistrustful of Experts: Survey

Professionals in the payments industry are very concerned about cybersecurity, but are at least a little mistrustful of third party solutions providers, suggest the results of TD Bank’s 2019 NACHA PAYMENTS survey. Conducted at the 2019 NACHA PAYMENTS Conference in Orlando this past May, the survey polled just under 500 of the payments industry professionals…

Yubico Officially Releases Lightning-Ready iOS Security Key

Yubico Officially Releases Lightning-Ready iOS Security Key

Yubico has formally launched the YubiKey 5Ci, a new security key with a Lightning connector for iOS and MacOS devices. The YubiKey 5Ci has a USB-C connector in addition to the Lightning connector, so it is also compatible with Android and Windows devices and can provide secure authentication regardless of the hardware being used.  “The…

Pages