Authentication

How to Prevent Evilginx Attacks Targeting Entra ID
Attackers continually refine their methods to compromise user identities and gain unauthorized access to sensitive systems. One particularly insidious threat is Evilginx, a phishing framework designed to bypass traditional multi-factor authentication (MFA) ...

Securing SMBs in a Cloud-Driven World: Best Practices for Cost-Effective Digital Hygiene Through Verified Authentication
Hackers are acutely aware that basic corporate account credentials present a significant vulnerability, increasing the stakes for SMBs in particular ...

Busting Common Passwordless Authentication Myths: A Technical Analysis
Explore the technical realities of passwordless authentication in this comprehensive analysis. We debunk common myths, examine security implications, and provide evidence-based insights into how this technology transforms digital security while enhancing user ...

Aembit Introduces Google Workload Identity Federation Support
4 min read The new WIF support capability enables access without having to manage secrets. The post Aembit Introduces Google Workload Identity Federation Support appeared first on Aembit ...

Beyond Passwords: AI’s Role in the Future of Authentication
Tired of passwords? AI is ushering in a new era of authentication! This post delves into cutting-edge technologies like behavioral biometrics, risk-based logins, and continuous authentication, revealing how AI is making access ...

Microsoft’s SFI Offers a Blueprint for Identity Security
A few weeks ago, Microsoft issued its first Secure Future Initiative Progress Report. Launched in November 2023, the Secure Future Initiative (SFI) is Microsoft’s acknowledgement that it needs to drastically improve its ...

(In)Fidelity Admits Data Breach 8 Weeks Ago — 77K PII Lost
FMR FAIL: Huge investment firm won’t say how it was hacked ...

Best practices for authentication and authorization: Yoshiyuki Tabata’s keynote at ADDO
Authentication (authn) and authorization (authz) are cornerstones of security in cloud-native applications. And yet, they remain some of the most challenging aspects for many organizations today ...

Kia Security Flaw Exposed, NIST’s New Password Guidelines
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The ...

Vlog: How 1Kosmos Can Be An External Authentication Method When Using Microsoft Entra ID?
Discover how 1Kosmos enhances Microsoft Entra ID with seamless identity-based authentication and passwordless access. Learn about new external authentication methods and how they empower organizations to protect critical assets, implement Conditional Access ...