TechDay Asia - Asia's technology news network
Asia
Search

Digital Credentials stories - Page 2

Story image
What should be Australia’s public sector response to strengthening online security?
Thu, 16th Dec 2021
#
mfa
#
iam
#
government
Government employees and contractors are prime targets for cyber-attacks because of the information they have access to.
Story image
How credentials became an attacker’s easiest target
Wed, 10th Nov 2021
#
iam
#
cybersecurity
#
cybersafety
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Story image
A surge in digital identities creating critical obstacles for businesses
Thu, 4th Nov 2021
#
iam
#
cybersecurity
#
one identity
Survey reveals surge in digital identities globally, with a doubling of managed identities in 2021, says One Identity.
Story image
Countering the rise of credential-based attacks
Tue, 12th Oct 2021
#
iam
#
cybersecurity
#
cybersafety
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
Story image
Attivo Networks launches credential-cloaking tool to deter data thieves
Thu, 9th Sep 2021
#
iam
#
cybersecurity
#
cybersafety
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
Story image
Thousands of stolen credentials end up on the internet by careless phishing scammers
Wed, 27th Jan 2021
#
phishing
#
email security
#
iam
Large-scale phishing campaign exposed stolen credentials to the public, Check Point Research and Otorio researchers find.
Story image
How a vantage point sees threats before they impact
Wed, 25th Nov 2020
#
casb
#
iam
#
cybersecurity
80% of data breaches involve compromised passwords, according to Verizon. Organisations must prioritize security measures. #CyberSecurity.
Story image
Remote workers need to up their game to keep organisations secure
Fri, 5th Jun 2020
#
uc
#
iam
#
hybrid & remote work
Remote workers' habits are jeopardising corporate security, says CyberArk study; password reuse and insecure BYOD devices are key culprits.
Story image
Hyland snaps up blockchain credentialing firm Learning Machine
Tue, 11th Feb 2020
#
blockchain
#
iam
#
hyland
Hyland expands document authentication capabilities with acquisition of blockchain innovator Learning Machine.
Story image
Credentials install base set to hit 11 billion by 2023
Thu, 13th Jun 2019
#
physical security
#
iam
#
digital credentials
The number of smart card shipments is forecast to increase from 618.8 million in 2018 to 732.7 million in 2023, according to ABI Research.
Story image
Credential theft industry booming in US, declining in Asia & EU
Wed, 10th Oct 2018
#
iam
#
cybersecurity
#
cybercrime
New research reveals the US is ripe for harvest, but Blueliv says the declines in EU and Asia are almost definitely only temporary.
Story image
ISACA adds credentials for cybersecurity audits
Wed, 3rd Oct 2018
#
iam
#
risk & compliance
#
cybersecurity
The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits.
Story image
Access management employees will thank you for – Seos has you covered
Mon, 14th May 2018
#
martech
#
iam
#
seo
Seos can be ported onto microprocessor devices, allowing the credential system to be delivered on mobile devices, wearables, and smart cards.
Story image
Singapore firm embraces blockchain to fight credential fraud
Mon, 15th Jan 2018
#
blockchain
#
iam
#
linkedin
A Singapore tech firm is using blockchain technology to bring validation and authentication to CVs and other credential types.
Story image
Credential theft is the hottest trend for cyber attackers in Q2
Fri, 29th Sep 2017
#
firewalls
#
network infrastructure
#
network security
This year cyber attackers have narrowed their focus to methods that involve credential theft, be it through malware, phishing or brute force attacks.
Story image
Javelin Networks: Give up on honeypots, because attackers will outsmart them
Mon, 31st Jul 2017
#
iam
#
hackers
#
digital credentials
Honey tokens, which are honeypots that are not computers, are easily studied and avoided by the average attacker.
Story image
Poor password choices make it easy for credential stuffing attacks, Digital Shadows warns
Mon, 29th May 2017
#
iam
#
passwords
#
digital shadows
Password re-use across businesses is a major cause of cyber breaches, according to a new report from Digital Shadows.
Story image
Digital university credentials enhance student mobility
Wed, 17th May 2017
#
ecm
#
martech
#
iam
UoA propels student potential with innovative digital credential system, bolstering global job and education prospects.