Topic: phishing resistance

  • AI and Complexity: The New Identity Protection Challenge

    AI and Complexity: The New Identity Protection Challenge

    Identity security is now a strategic cybersecurity pillar due to remote work, cloud adoption, and digital ecosystems, demanding greater organizational focus. Key challenges include AI-driven threats, low trust in identity providers, fragmented visibility, and underutilization of advanced tools li...

    Read More »
  • AI Phishing Surge Sparks Cybersecurity Alarm in Australia

    AI Phishing Surge Sparks Cybersecurity Alarm in Australia

    AI-driven phishing attacks are becoming more sophisticated and harder to detect, with 73% of Australians believing AI has increased the success of these scams. There is a significant gap between cybersecurity awareness and action, as 46% of Australians interacted with phishing messages in the pas...

    Read More »
  • Boost Security: Why Companies Need FIDO Security Keys

    Boost Security: Why Companies Need FIDO Security Keys

    Businesses are adopting FIDO security keys as a secure alternative to passwords, using hardware-based authentication to block attacks while simplifying user access. FIDO keys use public-key cryptography and physical verification (tap/PIN) to resist phishing and hacking, storing credentials in tam...

    Read More »
  • Securing Australia: How AI and Identity Redefine Cybersecurity

    Securing Australia: How AI and Identity Redefine Cybersecurity

    Australian businesses face rapidly evolving cybersecurity threats where traditional defenses are inadequate, with attackers now prioritizing immediate execution over stealth using AI to target identity systems. Cloud environments have become particularly vulnerable, with compromised credentials b...

    Read More »
  • Yubico Unveils Post-Quantum Crypto & Digital ID Breakthroughs

    Yubico Unveils Post-Quantum Crypto & Digital ID Breakthroughs

    Yubico introduced new passkey capabilities that extend beyond password replacement, enabling secure digital identity management and credential signing directly from YubiKeys. The company showcased a prototype for Post-Quantum Cryptography on hardware security keys, highlighting the need for new h...

    Read More »