IT Brief Asia logo
Technology news for Asia's largest enterprises

MFA / Multi-factor authentication stories

Story image
Phishing
Barracuda adds Zero Trust Access to enhance email security
This month
The new capabilities allow customers to control access to email systems and Microsoft 365 applications on a need-to-know basis, enhancing email security.
Story image
Ransomware
Cyber insurance. A changing of the guard.
This month
To obtain cyber insurance, organisations need to take a more mature approach to their security strategies by prioritising improving their cyber defences first, before investing in cyber insurance.
Story image
Cybersecurity
FIDO Alliance releases guidelines for optimising UX with FIDO Security Keys
June 2022
The new guidelines aim to accelerate multi-factor authentication deployment and adoption with FIDO security keys.
Story image
Cybersecurity
World (un)Password day? Yubico releases MFA guide encouraging new ideas
May 2022
In a slight departure from traditional World Password Day lore, Yubico has today announced a multi-factor authentication (MFA) guide.
Story image
Encryption
Why it's essential to focus on security fundamentals
April 2022
Recently the U.S. White House released a statement citing intelligence reports indicating "… that the Russian government is exploring options for potential cyber-attacks."
Story image
Ransomware
Strong multi-factor authentication key to protecting critical infrastructure providers
April 2022
"Having a ransomware mitigation plan is one step towards minimising risk, with phishing resistant MFA the key to keeping necessary accounts secure."
Story image
Encryption
Five data fundamentals to quash cybercrime
March 2022
Cybercriminals have never been happier, with constantly growing data footprints and operational disruption escalating the potency of cybercrime.
Story image
Phishing
Not having phishing resistant MFA will come at a cost for the finance industry
February 2022
With the volume of money handled by the finance industry on any given day, it's no wonder that it is a prime target for cybercriminals.
Story image
Cybersecurity
TDIR is screaming for cybersecurity vendor collaboration
February 2022
As the modern world is beset by ever-more common and sophisticated cyber-attacks, the very tools focused on TDIR are ready to be laid to rest.
Story image
Authentication
Southeast Asia sees growing demand for better electronic finance solutions
February 2022
More than three in five respondents in SEA were found to want OTP via SMS in every e-payment transaction, and 57% want to see the implementation of two-factor authentication.
Story image
Phishing
Salesforce now requiring all users to implement MFA
February 2022
Customer cloud service company Salesforce has taken significant steps to bolster its security protocols by requiring all users to implement multi-factor authentication (MFA) to access its products, solutions, and platforms.
Story image
Inventory management systems
Warning: Pay heed to Data Protection Day
January 2022
Data Protection Day, impending in Europe, serves as a global reminder of one of the most important responsibilities for any organisation: keeping sensitive data secure.
Story image
Cloud
LogMeIn spins out LastPass as standalone company
December 2021
LogMeIn says it plans to invest further in LastPass, particularly across the go-to-market functions, engineering, and the overall customer experience.
Story image
Yubico
What should be Australia’s public sector response to strengthening online security?
December 2021
Government employees and contractors are prime targets for cyber-attacks because of the information they have access to.
Story image
Multi-factor authentication
Varonis has discovered new threat bypassing multi-factor authentication in Box
December 2021
A method to bypass multifactor authentication for Box accounts that use authenticator apps such as Google Authenticator has been discovered by Varonis.
Story image
ThycoticCentrify
Zero Trust means strong, frictionless PAM and other controls
November 2021
Imagine an organisation’s information infrastructure as something like a bank’s safe deposit box service, with security guards on the door.
Story image
Bring Your Own Device
The rising importance of mainframe security
October 2021
Mainframe-reliant organisations should maintain a robust security posture to ensure that data remains secure.
Story image
Secure access service edge
What to know when considering zero trust digital transformation
September 2021
The security landscape is constantly changing, but SASE can help organisations tackle countless security challenges.
Story image
Cybersecurity
Why zero trust must form a key pillar of any cybersecurity strategy
June 2021
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.
Story image
Cybersecurity
Best practices and key factors for identity management
May 2021
In parallel with any physical form of identification, digital identities must be protected at all costs to prevent identity theft or fraud.
Story image
Cybersecurity
Yubico pledges to secure world's most at-risk organisations
March 2021
Yubico is partnering with Microsoft to offer 25,000 free YubiKey security keys to high profile and high risk organisations across 31 countries.
Story image
Mobile Device Management
Xero launches authentication app to boost account security
March 2021
“With 80% of data breaches being preventable, the roll out of mandatory MFA is a really important way to provide our customers extra protection."
Story image
Identity and Access Management
Essential tools for managing user identity and how they impact your bottom line
March 2021
Customer identity and access management (CIAM) is how companies give their end-users access to their digital properties, as well as how they govern, collect, analyse, and securely store data for those users.
Story image
Biometric security
We're not ready for passwordless systems—and that's quite alright
February 2021
Although passwordless authentication options are gaining prominence, there's a reason why we're still using passwords 60 years after their inception: they're effective.