CFOtech Asia logo
Technology news for Asia's CFOs and financial decision-makers

Authentication stories - Page 2

Story image
Scams
Scam messages on the rise, organisations must take action
July 2021
"Organisations need to re-evaluate the communications channels they use to interact with customers to better establish trust. With fraudsters monopolising open channels such as SMS and email, these channels cannot be relied upon."
Story image
API
Thales broadens access management capabilities for modern workplace
May 2021
Thales has expanded its access management capabilities to offer a modern, unified authentication platform across all applications or services in any IT environment.
Story image
Customer identification
Auth0 launches new feature for business customer identities
April 2021
"We are thrilled to launch Auth0 Organizations as our next-generation offering for easy onboarding, authentication, and administration of business customers.”
Story image
Cybersecurity
Yubico pledges to secure world's most at-risk organisations
March 2021
Yubico is partnering with Microsoft to offer 25,000 free YubiKey security keys to high profile and high risk organisations across 31 countries.
Story image
Biometric security
We're not ready for passwordless systems—and that's quite alright
February 2021
Although passwordless authentication options are gaining prominence, there's a reason why we're still using passwords 60 years after their inception: they're effective. 
Story image
Remote Working
DigiCert revamps PKI management capabilities for remote work
November 2020
The revamp provides new ways of delivering certificate automation that can authenticate employees and devices, and encrypt data over networks.
Story image
Identity and Access Management
Ping Identity acquires Symphonic Software
November 2020
The acquisition will add Symphonic’s dynamic authorisation platform to Ping Identity’s portfolio.
Story image
Cybersecurity
Post-COVID-19, every user should be treated as privileged
November 2020
Privilege is about what data a person can access, or actions a person can perform. It is about people, not just about accounts that unlock access to said data or elevated actions, writes Thycotic security engineer for Asia-Pacific Daniel Comarmond.
Story image
Cybersecurity
The value of trust in the age of data breaches
October 2020
Since it is practically impossible to avoid using the internet today, all parties are put under increasing pressure to implement better security practice to protect their personal information.