article thumbnail

Passkeys and The Beginning of Stronger Authentication

Thales Cloud Protection & Licensing

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. Despite solid cybersecurity defenses within her enterprise, the reliance on age-old passwords left it vulnerable.

article thumbnail

Why CISA is Warning CISOs About a Breach at Sisense

Krebs on Security

Both sources said the attackers used the S3 access to copy and exfiltrate several terabytes worth of Sisent customer data, which apparently included millions of access tokens, email account passwords, and even SSL certificates. The PR rep said Sisense wanted to make sure they had an opportunity to comment before the story ran.

CISO 258
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24

Security Boulevard

If you’re not using basic measures like password managers, two-factor authentication (2FA) and cybersecurity training, you’re risking more than you might realize. The post Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24 appeared first on Security Boulevard.

CISO 116
article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 1/5/24

Security Boulevard

Insight #1 In light of 23andMe blaming victims for their data getting breached, I have two things to ask: Users, please stop reusing passwords. Providers, please start requiring multifactor authentication (MFA). The post Cybersecurity Insights with Contrast CISO David Lindner | 1/5/24 appeared first on Security Boulevard.

CISO 116
article thumbnail

GUEST ESSAY: Why CISOs absolutely must take authentication secrets much more seriously

The Last Watchdog

The IT world relies on digital authentication credentials, such as API keys, certificates, and tokens, to securely connect applications, services, and infrastructures. Related: The coming of agile cryptography These secrets work similarly to passwords, allowing systems to interact with one another.

article thumbnail

Consumers are done with passwords, ready for more innovative authentication

CSO Magazine

CISOs looking to beef up their customer-facing authentication procedures to thwart cyberattacks need to walk a fine line. Selecting the most appropriate authentication method for your customers is something of a moving target because consumer attitudes are always changing.

article thumbnail

Removing Passwords, Without Compromising Security

Duo's Security Blog

In today’s complex IT landscape, one of the biggest problems faced by a Chief Information Security Officer (CISO) and their IT security team are forgotten and stolen passwords. On average, employees lose 11 hours per year resetting passwords and an average company spends ~$5M per year on setting and resetting passwords.