article thumbnail

Can Cloud Services Encourage Better Login Security? Netflix's Accidental Model

Dark Reading

Netflix's unpopular password-sharing policy change had a positive cybersecurity silver lining. Can more B2C service providers nudge their users toward secure authentication?

B2C 94
article thumbnail

Q&A: Here’s why VPNs are likely to remain a valuable DIY security tool for consumers, SMBs

The Last Watchdog

Surfshark partnered with a number of independent cybersecurity researchers to quantify the scope and pattern of data breaches over the past couple of decades. For this study, a data breach was defined as an intruder copying or leaking user data such as names, surnames, email addresses, passwords, etc. That’s for the B2C users.

VPN 230
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

Using the same password for all software applications increase the chances of cybercriminals learning an individual’s log-in credentials and gaining unauthorized access – resulting in data theft, identity theft and other harm. Single Sign-On (SSO) is a solution that combats password fatigue. fewer requests to reset passwords).

article thumbnail

Veridium Named Winner in the Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cybercrime. We’re thrilled to receive this prestigious cybersecurity award from Cyber Defense Magazine. Veridium is absolutely worthy of this coveted award,” said Gary S.

InfoSec 52
article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

Cybersecurity vendors, of course, have been responding. Stolen usernames and passwords are loaded up on botnets, which then relentlessly test them on account logon pages. Botnets can test stolen usernames and passwords at scale. Thus, what we’re experiencing today is the blossoming of B2B and B2C commerce transacted digitally.

article thumbnail

The story of the year: ransomware in the headlines

SecureList

This is a threat that seems almost inescapable, regardless of whether or not users occupy the cybersecurity or tech space – and it is having a direct impact on lives. The former target both B2B and B2C, while the latter target primarily the B2C sector. Words like Babuk and REvil have entered the everyday lexicon.

article thumbnail

‘If you wait for government, you’re going to be waiting a long time’: A look at Biden’s cyber funding

SC Magazine

The Biden administration proposed a $9 billion upgrade to the nation’s cybersecurity capabilities as part of his proposed stimulus plan. Updating and strengthening cybersecurity can be a costly proposition for small and medium businesses with limited budgets. What are they spending their attention on when it comes to cybersecurity?