Authentication

Don’t rush to deploy 5G if you want IoT security, agency warns

Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency

Facebook brings new privacy tools after recent backlash

Facebook has come up with new tools to make it easier to find and access privacy tools as a means to regain trust among users. 

1.4B stolen passwords are free for the taking: What we know now

The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords.

Partner Content
Gemalto and Ponemon Institute Study: Big gaps emerge between countries on attitudes towards data protection in the cloud

Study reveals regional disparities in adoption of cloud security: German businesses almost twice as likely to secure confidential or sensitive information in the cloud (61 percent) than British (35 percent), Brazilian (34 percent) and Japanese (31 percent) organizations.

Partner Content
Businesses under pressure - Employees want same simple access to cloud applications as consumers, finds Gemalt

70 percent believe that authentication methods applied in the consumer world can be applied to secure access to enterprise resources.

ManageEngine fixes critical zero-day vulnerabilities that could affect close to 10,000 companies in India

Here’s all you need to know about ManageEngine’s zero-day vulnerabilities, and what the company has done to remediate the problem

Aadhaar: SC resumes hearing on April 3; CEO to file answers to petitioners' questions

In the ongoing hearing in the Supreme Court regarding the validity of Aadhaar, the CEO of Unique Identification Authority of India (UIDAI) had said that personal data from Aadhaar cannot be hacked.

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind.

Avoiding security event information overload

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.

Third-party security vetting: Do it before you sign a contract

Security needs to ensure that all vendors and partners, even those not controlled by IT, meet the organization's security standards.

Aadhaar hack encore: Basic SQL injection exposes 96 lakh accounts

A security researcher brings to light the absolute ease with which Aadhaar data can be accessed.