article thumbnail

MY TAKE: Businesses gravitate to ‘passwordless’ authentication — widespread consumer use up next

The Last Watchdog

Related: Microsoft advocates regulation of facial recognition tools. Perhaps not coincidently, it comes at a time when enterprises have begun adopting passwordless authentication systems in mission-critical parts of their internal operations. Passwordless solutions now enable companies to turn BYOD into a strategic tool.

article thumbnail

Token Snags Ex-OneSpan Revenue Leader John Gunn as New CEO

Data Breach Today

Gunn Will Prepare Token's Wearable Authentication Ring for Large-Scale Production Token selected former OneSpan CRO John Gunn as CEO to scale the organization and prepare its wearable authentication ring for large-scale production.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: New tech standards, like ‘Matter’ and ‘BIMI,’ point the way to secure interoperability

The Last Watchdog

This is precisely what the consortium of software companies and device manufacturers, led Google, Amazon and Apple, set out to achieve when Matter was conceived four years ago. Matter works much the way website authentication and website traffic encryption gets executed. This same approach really could be applied to other industries.

Security 276
article thumbnail

Experts found a critical authentication bypass flaw in Rockwell Automation software

Security Affairs

A critical authentication bypass vulnerability could be exploited by remote attackers to Rockwell Automation programmable logic controllers (PLCs). “Additionally, this vulnerability could enable an unauthorized third-party tool to alter the controller’s configuration and/or application code.” Pierluigi Paganini.

article thumbnail

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io and Thales

Thales Cloud Protection & Licensing

Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io Each device relies on wireless data transmission to relay collected data back to the patient’s phone or other monitoring tool. They offer security solutions to clients in MedTech, V2X, and Industrial manufacturing. The result?

article thumbnail

Manufacturing needs to adopt a Zero Trust approach to mitigate increased cyber threats

Thales Cloud Protection & Licensing

Manufacturing needs to adopt a Zero Trust approach to mitigate increased cyber threats. Long gone is the time when manufacturing systems and operations were siloed from the Internet and, therefore, were not a cybersecurity target. Thu, 10/20/2022 - 06:20. Survey’s key findings.

article thumbnail

SHARED INTEL: Coming very soon — ‘passwordless authentication’ as a de facto security practice

The Last Watchdog

As a tradeoff for enjoying our digital lives, we’ve learned to live with password overload and even tolerate two-factor authentication. I had a chance to discuss this seminal transition with George Avetisov, co-founder and chief executive officer of HYPR , a Manhattan-based supplier of advanced authentication technologies.