Remove Digital transformation Remove Passwords Remove Technology
article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

LW: In what noteworthy ways have legacy technologies evolved? Ollmann: Cybersecurity technologies are continuously evolving; they must because both the threat and the business requirements are continuously changing. It’s been that way since the first person suggested using a password along with a login ID.

article thumbnail

MY TAKE: Businesses gravitate to ‘passwordless’ authentication — widespread consumer use up next

The Last Watchdog

This is one giant leap towards getting rid of passwords entirely. Excising passwords as the security linchpin to digital services is long, long overdue. Password abuse at scale arose shortly after the decision got made in the 1990s to make shared secrets the basis for securing digital connections.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

divya Fri, 10/11/2024 - 08:54 As user expectations for secure and seamless access continue to grow, the 2024 Thales Consumer Digital Trust Index (DTI) research revealed that 65% of users feel frustrated with frequent password resets. Improving Shared Device Management with Badge Inc.’s

article thumbnail

Cybersecurity Resolutions for 2025

IT Security Guru

Cybercriminals weaponise AI to speed up and scale traditional attack tactics, such as phishing and password cracking, while also creating entirely new forms of cyber threats. Key elements in protecting against AI-driven threats include timely software updates, network security improvements and strong password policies.

article thumbnail

Q&A: How your typing and screen swiping nuances can verify your identity

The Last Watchdog

And with “digital transformation” accelerating, there are so many more weakly-secured login accounts just waiting to be maliciously manipulated. The vast majority of these new, interconnected components and layers that make up digital transformation require login accounts, which translates into a fresh galaxy of attack vectors.

article thumbnail

RSAC insights: Why vulnerability management absolutely must shift to a risk-assessment approach

The Last Watchdog

Advanced VM tools and practices are rapidly emerging to help companies mitigate a sprawling array of security flaws spinning out of digital transformation. Digital transformation has spawned a cascade of nuanced, abstract vulnerabilities – and they’re everywhere. That’s changing — dramatically.

Risk 235
article thumbnail

Breaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key

Thales Cloud Protection & Licensing

Breaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key madhav Thu, 03/13/2025 - 06:46 As large organizations increasingly shift towards passwordless solutions, the benefits are clear: enhanced user experience, improved security, and significant cost savings. Trade Agreements Act (TAA).