article thumbnail

On Risk-Based Authentication

Schneier on Security

A Study on Usability and Security Perceptions of Risk-based Authentication “: Abstract : Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. I’ve blogged about risk-based authentication before. Paper’s website.

article thumbnail

Understanding Risk-Based Authentication (RBA)

Heimadal Security

Risk-Based Authentication (also known as RBA, context-based authentication, or adaptive authentication) is a security mechanism that looks at the profile (IP address, device, behavior, time of access, history, and so on) of the agent asking for access to the system in order to assess the potential risk associated with that transaction.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

12 risk-based authentication tools compared

CSO Magazine

Risk-based authentication (RBA), also called adaptive authentication, has come of age, and it couldn’t happen fast enough for many corporate security managers. What is risk-based authentication? It creates a risk profile of the person or device requesting access to the system.

article thumbnail

Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

Security Boulevard

Organizations grapple with elevated risks as malicious actors continuously devise new ways to circumvent standard security protocols and exploit vulnerabilities. The post Why Risk-Based Authentication Is Essential to a Zero Trust Strategy appeared first on Security Boulevard.

article thumbnail

How to Prevent High Risk Authentication Coercion Vulnerabilities

The State of Security

Most of us already know the basic principle of authentication, which, in its simplest form, helps us to identify and verify a user, process, or account. The post How to Prevent High Risk Authentication Coercion Vulnerabilities appeared first on The State of Security.

article thumbnail

Juice Jacking Debunked, Photographer vs. AI Dataset, Google Authenticator Risks

Security Boulevard

Next, we dive into a case where a photographer tried to get his photos removed from an AI dataset, only to receive an invoice instead of having his photos taken […] The post Juice Jacking Debunked, Photographer vs. AI Dataset, Google Authenticator Risks appeared first on Shared Security Podcast.

article thumbnail

CASMM (The Consumer Authentication Strength Maturity Model)

Daniel Miessler

Basically, how secure is someone’s current behavior with respect to passwords and authentication, and what can they do to improve? 10 Behaviors That Will Reduce Your Risk Online. This post is an attempt to create an easy-to-use security model for the average internet user. People like moving up rankings, so let’s use that!