article thumbnail

DEF CON 31 – John Novak’s ‘Azure B2C 0Day – An Exploit Chain From Public Keys To Microsoft Bug Bounty’

Security Boulevard

Permalink The post DEF CON 31 – John Novak’s ‘Azure B2C 0Day – An Exploit Chain From Public Keys To Microsoft Bug Bounty’ appeared first on Security Boulevard. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada ; via the organizations YouTube channel.

B2C 59
article thumbnail

AI Transforming Manufacturing Innovation, Branding, and Customer Interactions

SecureBlitz

B2C organizations are figuring out how to strategically use ChatGPT and other generative AI technologies to make their business grow and scale better. Here, I will talk about how generative artificial intelligence is transforming manufacturing innovation, branding, and customer interactions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Can Cloud Services Encourage Better Login Security? Netflix's Accidental Model

Dark Reading

Can more B2C service providers nudge their users toward secure authentication? Netflix's unpopular password-sharing policy change had a positive cybersecurity silver lining.

B2C 94
article thumbnail

Making All Your Users Feel Welcome: Arkose Labs Challenges Are Now Certified WCAG Compliant

Security Boulevard

Accessibility is a must-have for any B2C website or digital application. It’s the only way to be inclusive of all of your consumers, provide a great user experience for everyone, and – in many cases – meet legal regulations and requirements.

B2C 98
article thumbnail

MY TAKE: How consumer-grade VPNs are enabling individuals to do DIY security

The Last Watchdog

I’ve since discovered that there’s a heck of a lot going on in the B2C VPN space. The top B2C VPNs proved to be very clever and effective at differentiating themselves from one another and very successful at marketing their services. Other B2C VPNs are logically promoting and developing a wide array of security-related functionalities.

B2C 215
article thumbnail

Yodel Confirms Cyberattack

Heimadal Security

It was initially known as the Home Delivery Network, until it bought the B2B and B2C businesses of DHL Express UK and afterward, renamed itself as Yodel in May 2010. Yodel is a delivery service company from the United Kingdom. What Happened? A cyberattack has caused delays in package distribution and online order tracking for […].

B2C 101
article thumbnail

Identity in the B2B2X World

Security Boulevard

Identity and Access Management has long been confined to two (or maybe three) buckets: B2E (employee focused), B2C (external consumer or customer focused) and then the “other” bucket – namely for IoT, machine to machine and application or process style IAM. I understand these buckets. My clients understand these buckets.

B2C 98