article thumbnail

Episode 245: How AI is remaking knowledge-based authentication

The Security Ledger

Six decades in, password use has tipped into the absurd, while two-factor authentication is showing its limits. We talk with Matt Salisbury of Honeybadger HQ, which is using AI and machine learning to re-imagine knowledge-based authentication. 60 years in, passwords at a breaking point. Read the whole entry. »

article thumbnail

Experian, You Have Some Explaining to Do

Krebs on Security

In both cases the readers used password managers to select strong, unique passwords for their Experian accounts. Turner said he created the account at Experian in 2020 to place a security freeze on his credit file, and that he used a password manager to select and store a strong, unique password for his Experian account.

Passwords 315
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bank Attacks Put Password Insecurity Back in the Spotlight

The Security Ledger

Two separate attacks on banks in the United States and Pakistan revealed this week highlight once again the inherent weakness of a security practice that relies on passwords or knowledge-based credentials to protect critical information. Read the whole entry. »

article thumbnail

FIDO - Leading the Zero Trust Passwordless Authentication Evolution

Thales Cloud Protection & Licensing

It’s no secret that passwords have become one of the weakest links in enterprise security. Credential compromise is the leading cause of cybercriminals’ ability to gain access to enterprise resources. Implement policies based on a “least privilege” access model. Tue, 08/16/2022 - 06:32.

article thumbnail

How to Use MITRE ATT&CK to Understand Attacker Behavior

eSecurity Planet

MITRE ATT&CK (“miter attack”) is an up-to-date and widely-used knowledge base that focuses on how attackers think and operate. It’s based on practical use cases, so companies can better evaluate security issues and get examples of common tactics and techniques used by threat actors.

Analytics 113
article thumbnail

MyEquifax.com Bypasses Credit Freeze PIN

Krebs on Security

The portal asked me for an email address and suggested a longish, randomized password, which I accepted. It then asked a series of four security questions — so-called “knowledge-based authentication” or KBA questions designed to see if I can about my recent financial history. In fact, it was too easy.

Passwords 269
article thumbnail

GUEST ESSAY: Why corporate culture plays such a pivotal role in deterring data breaches

The Last Watchdog

A knowledge-base that’s understandable and accessible to all staff. Well thought-out protocols related to access control, breach management, and device usage. On a strong password policy and an authentication process that doesn’t impede your workers. Amidst all this, make sure you also focus on the basics.