Displaying items by tag: MFA

GUEST OPINION: Like them or loathe them, passwords remain an important component of IT security within all businesses. Used to secure everything from email servers and databases to cloud resources and remote networks, they’ve been part of the IT landscape since business computing was first introduced.

Published in Guest Opinion

The software supply chain starts with the developer, and with developer accounts being prized targets for account takeover, GitHub will require all users who contribute code to enable one or more forms of 2FA before the end of 2023.

Published in Open Source

Yubico, of YubiKey fame, has issued a multi-factor authentication (MFA) guide to help better define common and new industry terms, as well as the standards that are supporting modern authentication. If you’re not using MFA to protect your online identity then you really must, and Yubico’s guide can help you see what it is all about. 

Published in Security

Apple, Google and Microsoft have backed a passwordless sign-in standard created by the Fast Identity Online [FIDO] Alliance and the World Wide Web Consortium.

Published in Security

The Australian Cyber Security Centre (ACSC) is encouraging organisations "to urgently adopt an enhanced cyber security position. Organisations should act now and follow ACSC’s advice to improve their cyber security resilience in light of the heightened threat environment."

Published in Security

GUEST INTERVIEW: With passwords and traditional two-factor authentication no longer as secure as it once was, Yubico's evolving YubiKeys have been the next-gen answer, with the new YubiKey Bio now another step above in delivering an ever more secure environment, Geoff Schomburgk joined us again at iTWireTV to explain this and plenty more.

Published in Security

GUEST INTERVIEW: With passwords and traditional two-factor authentication no longer as secure as it once was, Yubico's evolving YubiKeys have been the next-gen answer, with the new YubiKey Bio now another step above in delivering an ever more secure environment, Geoff Schomburgk joined us again at iTWireTV to explain this and plenty more.

Published in Guest Interviews

GitHub continues its ongoing investment in account security and developer experience by adding a 2FA mechanism in GitHub Mobile on iOS and Android. This provides another authentication option alongside the existing security keys, WebAuthn, one-time passcode, and SMS options.

Published in Security

GUEST OPINION: As Australian businesses strive to improve their IT security amid an ever-evolving threat landscape, increasing numbers are deploying multi-factor authentication (MFA).

Published in Guest Opinion

Yubico is well-known for its YubiKey range of hardware-based security keys that allow individuals and companies to maximise security in convenient, easy-to-use ways, and minimise reliance on passwords. The YubiKey Bio range now brings fingerprint recognition to the stable. If you're still on the fence about passwordless security, here's your opportunity to get on board in the simplest way.

Cloud identity security solutions provider ThycoticCentrify integrates its platform with Secret Server, a privileged account and session management solution.

Published in Cloud

YubiEnterprise Delivery, the enterprise-scale deployment of Yubico's security keys, was first launched in May 2020 and is now available in 49 countries. Businesses and Governments in those regions can distribute YubiKeys directly to their employees, partners, and customers.

Published in Security

When the internet was designed 30 years ago, security was not a priority as it was primarily created as a way to connect and easily share information with others around the world. Fast forward to today with news of hacks and breaches almost daily, much of the online world is trying to play catch up to help secure themselves, and in many cases, their companies by adopting better cybersecurity practices and tools.

Published in Guest Opinion

The annual cybersecurity report from Acronis has arrived, showing companies, IT managers, remote workers and more seriously struggling with cyber fitness, packing on the security vulnerability kilos after 18 months on the COVID couch in what is a MUST READ report for every modern company.

Published in Security
Tuesday, 17 August 2021 22:28

GitHub goes passwordless for CLI Git operations

GitHub is home to many of the world's greatest open-source projects and to ensure continued protection to GitHub users and projects it no longer accepts Git password authentication for CLI operations and requires the use of stronger authentication methods.

Published in Security

GUEST INTERVIEW: Yubikeys are the ultimate multi-factor authentication tool, used by consumers, businesses, governments and any organisation to keep accounts and networks secure in the age of global Cyber Cold War, and we spoke to Yubico's Geoff Schomburgk on iTWireTV.

Published in Guest Interviews

GUEST INTERVIEW: Yubikeys are the ultimate multi-factor authentication tool, used by consumers, businesses, governments and any organisation to keep accounts and networks secure in the age of global Cyber Cold War, and we spoke to Yubico's Geoff Schomburgk on iTWireTV.

Published in Security

Hardware authentication security key provider Yubico today announced the general availability of its next-generation FIPS security keys, the YubiKey 5 FIPS series. This is the industry’s first set of multi-protocol security keys with FIDO2 and WebAuthn support to receive FIPS 140-2 validation.

Published in Security

With ever-increasing cyber threats, it's essential we protect our online identities but a password isn’t enough. If you thought SMS-based two-factor authentication was the solution, think again. For the greatest protection, you need FIDO2 security, and FEITIAN Technologies has just the device for you - and are giving iTWire readers a discount too.

Unlocking Aussie mobile security sentiments and habits, the report reveals "nationwide confusion over critical security concepts – leading to risky habits", plus some top smartphone security tips

Published in Home Tech
Page 1 of 2

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments