FutureFive New Zealand - Consumer technology news & reviews from the future

Authentication stories - Page 7

Realistic photo secure computer workstation hardware security key login

Yubico urges stronger passkey rules to boost digital security

Mon, 18th Aug 2025
#
data protection
#
iam
#
cybersecurity
Yubico urges firms to adopt stricter passkey policies, favouring device-bound keys over synced ones to boost digital security and prevent breaches.
Illustration cloud surrounded by digital padlocks one open data streams leaking

Google breach exposes major risks in Salesforce cloud security

Thu, 14th Aug 2025
#
saas
#
data protection
#
mfa
Google reveals data breach via ShinyHunters exploiting Salesforce cloud, exposing risks in SaaS security and reliance on user authentication methods.
Business office broken padlock digital data leak cyber security breach blue

Picus Security warns of rising enterprise password breaches

Tue, 12th Aug 2025
#
ransomware
#
advanced persistent threat protection
#
iam
Picus Security's Blue Report 2025 reveals enterprise password breaches nearly doubled to 46%, exposing firms to greater cyber threats and ransomware risks.
Digital illustration server room lock shattering abstract computational power

Quantum computing exposes Active Directory to urgent new risks

Fri, 8th Aug 2025
#
data protection
#
mfa
#
cloud security
Quantum computing presents urgent security risks for organisations relying on Microsoft Active Directory, as legacy systems struggle to meet new cryptographic demands.
John headshot

Exclusive: Google's John Hultquist warns cyber attackers are getting younger & faster

Fri, 1st Aug 2025
#
malware
#
ransomware
#
cloud security
Google's Threat Intelligence Group uses AI and vast global data to outpace cybercriminals in an evolving digital arms race, says Chief Analyst John Hultquist.
Realistic illustration security guard inside server room monitoring network protection

The bouncer at the door: Protecting your network from within

Fri, 1st Aug 2025
#
malware
#
firewalls
#
data protection
Outdated network hardware poses a hidden threat, turning your vital security 'bouncer' into a vulnerability that invites cyber-attacks and data breaches.
Confident business leader glowing podium abstract cloud connections leadership

Infobip named Leader in 2025 Gartner Magic Quadrant for CPaaS

Wed, 30th Jul 2025
#
uc
#
cx
#
martech
Infobip is named a Leader in Gartner's 2025 Magic Quadrant for CPaaS, topping Completeness of Vision for the first time in its third consecutive year.
Ps morey haber  1

The Identity Epidemic: Why your business's digital front door is under siege

Mon, 21st Jul 2025
#
firewalls
#
digital transformation
#
network security
Identities have become the prime target in cybersecurity, with businesses urged to secure digital access through ownership, least privilege, MFA, and secret management.
Realistic server room with red highlighted vulnerable racks shadowy cyber threat

Golden dMSA flaw in Windows Server 2025 exposes Active Directory

Wed, 16th Jul 2025
#
advanced persistent threat protection
#
iam
#
cybersecurity
A critical flaw in Windows Server 2025's delegated Managed Service Accounts allows attackers to persistently access and control Active Directory environments, warns Semperis.
Yubikey

Yubico launches Enhanced PIN YubiKey to boost enterprise security

Wed, 16th Jul 2025
#
mfa
#
iam
#
data privacy
Yubico launches Enhanced PIN YubiKey 5 via its global service, boosting PIN security with stricter rules to help enterprises meet evolving regulations worldwide.
Secure digital network shield ai brain identity masks layered networks

Okta & Palo Alto Networks expand AI security integrations

Wed, 16th Jul 2025
#
firewalls
#
cloud security
#
physical security
Okta and Palo Alto Networks deepen AI security partnership with new integrations enhancing identity-based defences and unified threat responses for enterprises.
Masked person creating lifelike digital face on computer ai identity fraud

Deepfake & AI crime surge poses major threat to business trust

Thu, 10th Jul 2025
#
physical security
#
iam
#
genai
Trend Micro warns that rising deepfake and AI crimes threaten business trust, with fraudsters using synthetic media to impersonate executives and bypass security.
Secure home network with digital lock and multiple connected devices

Five use cases that justify ditching VPNs for good

Thu, 10th Jul 2025
#
uc
#
firewalls
#
network infrastructure
Organisations face rising VPN breaches and slow speeds, prompting a shift to Zero Trust Network Access for safer, faster hybrid work and cloud migration.
Ps   umesh shankar   headshot

Bugcrowd names Umesh Shankar to board, bolstering AI security

Wed, 9th Jul 2025
#
data protection
#
cloud security
#
iam
Bugcrowd appoints Umesh Shankar, Microsoft AI's VP of Data Security, to its advisory board to strengthen AI security expertise and innovation.
Digital illustration secure cloud environment with ai agents protecting data

Okta launches Cross App Access to boost AI security in firms

Tue, 24th Jun 2025
#
firewalls
#
digital transformation
#
network security
Okta has launched Cross App Access to enhance enterprise AI security by giving IT teams central control and visibility over AI agent interactions with apps.
Digital security shield protecting interconnected app icons data streams

Outpost24 identifies key OAuth risks & best practice solutions

Sat, 21st Jun 2025
#
application security
#
iam
#
breach prevention
Outpost24 reveals seven common OAuth risks and offers best practices to help organisations prevent unauthorised access and data breaches through better token security.
Realistic robotic hand holding credit card above digital shield for secure ai payments

AI Agents - The struggle to balance automation, oversight, & security

Tue, 17th Jun 2025
#
devops
#
fintech
#
martech
Visa's plan to use AI agents for automatic payments sparks debate over security risks and whether consumers will trust machines handling their money.
Fishing hook email phishing threats targeting new zealand map illustration

Just 3% of New Zealand domains enforce top anti-phishing policy

Fri, 13th Jun 2025
#
edutech
#
data protection
#
phishing
Just 3% of New Zealand domains enforce the strict DMARC p=reject policy, leaving most vulnerable to phishing despite upcoming government mandates.
Closeup computer screen broken padlock digital data flow modern office

Experts warn of surge in Google, Apple, Microsoft breaches

Fri, 30th May 2025
#
crypto
#
cloud security
#
phishing
Experts warn of a rise in Chrome extension attacks and a breach exposing 184 million stolen log-ins, highlighting urgent cybersecurity risks worldwide.
Techday f 8f0f3cd2e0f40979bb35

CyberArk named leader in secrets management by KuppingerCole

Tue, 13th May 2025
#
hybrid cloud
#
pam
#
cloud security
CyberArk named Overall Leader in KuppingerCole's 2025 Enterprise Secrets Management report for its AI-powered identity security platform.