News

Think your passwords are strong enough? AS-REP Roasting is back in the spotlight — and it's targeting weak spots in Active ...
LOS ALTOS, Calif., June 04, 2025 (GLOBE NEWSWIRE) -- Descope, the drag & drop external IAM platform, today announced its inclusion in Rising in Cyber 2025, an independent list launched by Notable ...
Google's latest scams survey finds younger users ditching passwords for more advanced sign-in solutions like passkeys and ...
Kosmos is the only Kantara-certified full service credential service provider (CSP) platform that also holds a FedRAMP High ...
On April 11, 2025, the North Dakota governor signed H.B. 1127 (the “Act”), which establishes new data security measures and ...
P2P payments make sending money fast and easy. Learn how they work, their security features, benefits, and the best platforms ...
Astute data custodians use zero-trust methods to enhance infrastructure security. This model shifts the security perimeter ...
The growth of AI agents puts the need for robust API authentication practices front and center, so today we’re highlighting two AI agent scenarios and how you could deal with their typical ...
The illegal database contained ‘thousands of files that included emails, usernames, passwords, and the URL links to the login ...
Using a computer security key is the best way to authenticate your identity, but not all security keys are created equal. USB ...
Complementing traditional industry research based on post-incident findings, the report presents a proactive analysis of the state of identity controls. Unlike assessments of external exposures, ...
From Basic Auth’s simplicity to OAuth 2.0’s delegated muscle, this quick-read unpacks the strengths, gaps, and best-fit use ...