article thumbnail

GUEST ESSAY: ‘Continuous authentication’ is driving passwordless sessions into the mainstream

The Last Watchdog

Much more effective authentication is needed to help protect our digital environment – and make user sessions smoother and much more secure. Underscoring this trend, Uber was recently hacked — through its authentication system. The best possible answer is coming from biometrics-based passwordless, continuous authentication.

article thumbnail

GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

The Last Watchdog

Under the current system, companies have two choices: subject employees to burdensome processes to access work servers or become low-hanging fruit for a cyber attack. The next big thing is passwordless authentication. Let’s remove that point of attack and start fixing the problem at the source.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deepfake technology and its implications for the future of cyber-attacks

CyberSecurity Insiders

Once the recording (for this is what it turned out to be) began with the next line in the pre-programmed speech, with no acknowledgement of my response, I knew I was dealing with a robot powered by technology that simulated a real voice. With every passing day attackers grow more and more intelligent, creative, and technologically advanced.

article thumbnail

American Fast Company website shutdown after Cyber Attack

CyberSecurity Insiders

Fast Company that offers technology and business news through print and online circulation was hit by a cyber-attack recently, promoting the company to shut it down on a temporary note. A certain section of media stated that the attack was of the ransomware genre earlier. However, nothing can be confirmed yet. .

article thumbnail

Is Your Small Business Safe Against Cyber Attacks?

CyberSecurity Insiders

Ways to Protect Your Small Business from Cyber Attacks . . A successful cyber attack can cost you around $3 million! Here are some of the ways to protect your small business from cyber attacks. . Modern technology comes with improved network security offering higher protection. . Firewalls .

article thumbnail

Kalay platform vulnerability exposes millions of IoT devices to cyber attacks

CyberSecurity Insiders

Cybersecurity Researchers from Mandiant have disclosed that millions of IoT devices operating across the globe were vulnerable to cyber attacks because of a flaw in Kalay Cloud platform software supplied by ThroughTek.

IoT 142
article thumbnail

Authentication is Outdated: A New Approach to Identification

CyberSecurity Insiders

Identity and user authentication continue to be a concern for IT managers. It’s time to take a closer look at alternative identity management and authentication strategies. With a digital trust ecosystem in place, the user retains control of their credentials while being issued a unique identifier for authentication.