With so much hype about passwordless authentication nowadays, it is undeniable that passwordless authentication will succeed the future of authentication method. Passwordless authentication, as the name suggest, is a method that does not require password or answering security questions to gain access to any application or IT system. It offers a lot of benefits to
Many services and applications had begun to apply passwordless authentication, an authentication method that dismisses the use of passwords. The importance of Passwordless authentication has been increasing rapidly in this recent years. Hence, the hype that revolves around passwordless authentication had brought many opinions on the method, in which some may be misinterpreted. This post
Authentication is an essential step in cybersecurity. In the recent years, passwordless authentication as an authentication method has become critically important as cyber attacks continues to evolve due to various adoption of technologies and practice into the IT infrastructure. The importance of passwordless authentication had also been highlighted by trusted research and advisory firms like
Digital transformation had brought many impacts to the world we are living today. One of the impact is massive utilisation of internet applications in various daily activities and adoption of IT system in organisations. Until today, password authentication remains as the most implemented authentication method for data security and protection in most applications. Recently, as
The transformation towards cloud native as well as the increase of distributed workforce trend in organisations had changed our environment into the world without boundaries. While these changes significantly improve productivity and the growth of companies, it also brought about a more complex and critical cyber security issues. As a results, organisations need a more
Fake shopping apps to steal user banking credentials are rising, as threat actors continue to be creative and attempt to expose the various hacking possibilities. As more and more consumers will install a one-stop mobile shopping app in their mobile phone, then it matters how you distribute fake shopping apps to steal user data include
Attack surface that keeps on evolving leading to the need for a more reliable risk management culture. Today, Attack Surface Management (ASM), an approach of addressing attack surface through the attackers’ perspective had become the top priority for security teams and risk management leaders (i.e CIOs, CTOs, CISOs). Distinctly, Attack Surface Management offers many benefits
Today, Attack Surface Management had become the top priority for security team and risk management leaders. The reasons are the increase in cyber risk where attack surface is expanding due to digital transformation and cloud migration, as well as lack of visibility of assets including, unknown, unmanaged and poorly-managed assets making organisations at greater risk
Among the years, dark web monitoring and how you can monitor it in particular for your own enterprise exposed credentials is one of the key topics. For any digital breach attempt, you can not prevent it. Your enterprise system is as strong as your user ID and password. But if it already exposed credentials, then
In the recent years, digital transformation has become the new normal in every organisation. Through digital transformation, the IT infrastructures of organisation are becoming more connected to the internet. While this transformation helps eases accessibility to companies data for sharing and collaboration, it leads to bigger cybersecurity challenges. In 2022, Gartner had revealed that attack