Displaying items by tag: Credentials

A protocol used by Microsoft Exchange, the popular email server software used by both individuals and businesses, has been found to be leaking credentials of users, who attempt to authenticate from clients like Microsoft Outlook, due to a defect in its design.

Published in Security

Identity detection and response specialist Attivo Networks' new TheatStrike technology is said to hide real credentials from attacker tools and bind them to their applications, while showing decoy credentials as bait for threat intelligence gathering.

Published in Security

Company News: Attivo Networks, the industry experts in lateral movement attack detection and privilege escalation prevention, announced today a new integration for the Attivo EDN Suite with SentinelOne's Singularity XDR platform. With an uptick in the number of human and machine entities to secure, the attack surface is expanding, making it challenging for organisations to protect their networks from credential-based attacks.

Published in Security

Scammers are taking advantage of the busy shopping season and trying to relieve customers of Westpac of some of their earnings, setting up a site that looks very much like the real thing to try and lure customers into entering their credentials.

Published in Security
Wednesday, 21 October 2020 00:01

Attivo ThreatPath helps reduce credential exposures

Attivo Networks has updated its ThreatPath credential exposure tool to identify and remediate high-risk exposures based on identities with excess privileges, application data sources, at-risk practices such as local admin credentials stored on the endpoint, and shadow admin accounts.

Published in Security
Thursday, 03 September 2020 22:50

Beware - excessive permissions are the #1 cloud threat

GUEST OPINION by Eyal Arazi, Radware: Migrating workloads to public cloud environment opens up organisations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centres.

Thursday, 03 September 2020 22:39

Beware - excessive permissions are the #1 cloud threat

GUEST OPINION by Eyal Arazi, Radware: Migrating workloads to public cloud environment opens up organisations to a slate of new, cloud-native attack vectors which did not exist in the world of premise-based data centres.

Published in Cloud

Security intelligence firm Recorded Future claims to have discovered the most likely source of a collection of data from breaches stretching back years; given the moniker Collection #1, it was disclosed recently by security professional Troy Hunt and said to contain 773 million email addresses and corresponding passwords.

Published in Security
Monday, 18 September 2017 22:38

IBM ranks as No 1 blockchain vendor: Juniper

IBM has the strongest credentials in the blockchain sector, according to Juniper Research, which says that the company is “clearly regarded” as being well ahead of competitors.

Published in Market
Thursday, 25 February 2016 08:39

Centrify credentials work for Good

A partnership between Centrify and BlackBerry sees the former's credentials certified as 'Secured for Good' and supporting single sign on from mobile devices.

Published in Security

DeakinDigital, a wholly owned subsidiary of Deakin University, has formed a strategic partnership with Credly to deliver its new credentialing program; which Deakin says is a world-first alternative to traditional education models.

Published in Education

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments