article thumbnail

IDIQ Names Industry Veteran Damian Bushnell Chief Product Officer

Identity IQ

The company offers the IdentityIQ® and MyScoreIQ® brands for identity theft and credit report monitoring and the DataBreachIQ® brand for business data breach preparation and response support. For more than two decades, Bushnell has been a technology and product leader in the consumer credit and identity theft protection industry.

article thumbnail

IDIQ Names Industry Veteran Damian Bushnell Chief Product Officer

Identity IQ

The company offers the IdentityIQ® and MyScoreIQ® brands for identity theft and credit report monitoring and the DataBreachIQ® brand for business data breach preparation and response support. For more than two decades, Bushnell has been a technology and product leader in the consumer credit and identity theft protection industry.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Compromised logins continue to facilitate cyber attacks at all levels, from phishing ruses to credential stuffing to enabling hackers to probe deep inside of a breached network. Username and password logins emerged as the go-to way to control access to network servers, business applications and Internet-delivered consumer services.

Passwords 164
article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach.

article thumbnail

Selecting the Right Cloud SSO Solution for Your Organization

Thales Cloud Protection & Licensing

Of those surveyed, 20% of respondents indicated that they have deferred on-premises technology spend. But using one or two-factor logins such as email and password leaves enterprises vulnerable to security risks and data breaches. Short term vs. long term. IAM innovations for cloud-based remote access. FIDO Authentication.