Remove 10
article thumbnail

Android 7.0+ Phones Can Now Double as Google Security Keys

Krebs on Security

and higher can now be used as Security Keys , an additional authentication layer that helps thwart phishing sites and password theft. Once a user has enrolled their Android phone as a Security Key, the user will need to approve logins via a prompt sent to their phone after submitting their username and password at a Google login page.

Security 240
article thumbnail

Portnox Cloud: NAC Product Review

eSecurity Planet

Since then Portnox continued to add capabilities, launched the first cloud-native NAC in 2017, and now offers a NAC SaaS solution, Portnox Cloud. For example, encryption keys, administrator passwords, and other critical information are stored in the Azure Key Vault in FIPS 140-2 Level 2-validated hardware security modules (HSMs).

Cloud 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Massachusetts pumps $1.1 million into state college cybersecurity training programs

The Last Watchdog

“I am thrilled that Mass CyberCenter is hosting this event to bring our public servants up to date on the latest threats, and share how they can protect themselves and their constituents. I am proud to work hand in hand with these individuals as the Legislature considers bills that will make our systems more robust and resilient.”

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. million US customers had been affected by 2017’s Equifax breach , bringing the total number of victims to 147.9 In March, it transpired that a further 2.4

article thumbnail

In Case You Missed It: Money 20/20 Conference Highlights

Thales Cloud Protection & Licensing

Three topics that piqued my interest at the 2017 show included authentication, blockchain and digital payments. This model enables interoperability among authentication devices and eliminates user frustration caused by creating and remembering multiple usernames and passwords. Authentication. Blockchain. Digital Payments.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

According to statistics from the FBI’s 2021 Internet Crime Report , complaints to the Internet Crime Complaint Center (IC3) have been rising since 2017. Often, a scammer will simply target the people in a company and fool them into giving up their personal details, account passwords, and other sensitive information and gain access that way.

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

The NYDFS Cybersecurity Regulation became effective in March 2017 and, beginning on February 15, 2019, required all NYDFS-regulated entities (Covered Entities), including First American, to annually certify compliance with the Regulation. 2020-0030-C at 10 (July 21, 2020). 2020-0030-C at 10 (July 21, 2020). e) and 500.01(g),