A recent Dell Technologies Brain on Tech study found when people were tasked with logging into a computer with a long, difficult password, their stress not only increased by 31% within 5 seconds, but it continued to rise even after successfully logging in. Password stress goes hand in hand with a growing appetite for biometrics on devices. Dave Konetski, VP/Fellow of Dell Technologies Client Solutions Group, believes that as technologies like fingerprint readers and facial recognition continue to gain popularity, "this year’s Change Your Password Day may mark a shift or perhaps a beginning to the end of passwords as we know it."
The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) joined the Cactus League, its teams and spring training facilities, and state and local partners for a virtual tabletop exercise to review pre-incident preparedness measures and response plans at stadiums during spring training.
Entrust surveyed U.S. and U.K.based adults with smartphones to see their thoughts on consumer data privacy. The State of Consumer Data Privacy Survey found that only 21% of respondents said they trust established global brands to keep their personal information secure.
Outsourcing cybersecurity is an increasingly attractive solution: 83% of IT leaders with in-house security teams are now considering outsourcing their security efforts to an MSP in 2021, according to the Syntax IT Trends Report.
According to a new survey conducted by Irdeto and Censuswide, 15% of healthcare technology providers admit having no knowledge or awareness of the new cybersecurity regulations such as US FDA premarket guidelines. The same respondents also stated that regulatory compliance is the most important factor driving companies to have a water-tight cybersecurity strategy for their products and solutions, emphasizing the need for partnering with external cybersecurity experts to help decipher and navigate imminent security requirements.
As lawmakers and law enforcement continue to unravel the events and impact of the crisis at the U.S. Capitol on Wednesday, January 6th, attention is turning to identification and prosecution of those that illegally entered, attacked, and looted the Capitol and the offices of the legislature housed there. We’re learning more about the litany of security failings and it is imperative that we take the lessons offered by this example and make the changes they demand now, at our state capitol buildings, as well as in our businesses.
In addition to his role as a cybersecurity lawyer, Roy E. Hadley Jr. is well-versed in the operational and technical aspects of cybersecurity. At Adams and Reese LLP, he assists clients with response and recovery efforts in the event of an attack and assists clients with hardening their enterprises against cyberattacks.
In this article, we discuss how two-factor authentication has been evolved to address the shortcoming of single authentication systems. We also discuss how we can utilize a blockchain technology to transform 2FA by migrating the centralized network into a decentralized blockchain network. As more Internet-of-Things devices require authentication credentials and users increase their repository of usernames and passwords for accessing web services, the emergence of 2FA solutions based on blockchain technology is inevitable.
Every organization has hundreds of applications and databases, and its employees access them every day using their credentials (that is, their username and password). An attacker with such valid credentials can bypass existing security solutions, as they look like a legitimate user. As per the Verizon Data Breach report in 2016, more than 63% of successful breaches involved compromised credentials. Two-factor authentication (2FA) provides an added layer to the existing credential-based system protection as a solution to this drastically growing problem. As such, in this article, we will cover the following two topics: What is 2FA and Blockchain for 2FA.