Why Ephemeral Certificates Are The Ideal Option For Secure IT Access

Password managers, long heralded as the gold standard for consumer password safety, have been shown to have vulnerabilities. Research shows that password managers can leak login credentials to the PC’s memory, making them vulnerable to hacking. In light of this research, it’s certainly time for consumers to examine their password management best practices. Consumers should […]

Biometrics Adoption

A panel of industry experts at the 2019 ISC West conference in Las Vegas are predicting that biometrics are going mainstream with the mobile sector leading the way to adoption.  Robert Capps, VP and Authentication Strategist at NuData Security: “Biometrics technology is increasingly implemented across the market, including the financial and ecommerce industries. Today, passive biometrics is an option to […]

Automation Will Improve Security Function, Say UKprofessionals In New Global Survey

Security professionals reveal the reasons and concerns behind the adoption of automation and AI as security tools in the 2019 Ponemon Institute and DomainTools survey  DomainTools, a leader in domain name and DNS-based cyber threat intelligence, today announced the results of the study “Staffing the IT Security Function in the Age of Automation”, conducted in conjunction with the Ponemon Institute. More than 1,400 security professionals […]

Reaction On Bounty Fined £400,000 By ICO

It has been reported that pregnancy club Bounty UK has been given a £400,000 fine by the ICO for illegally sharing the personal information of more than 14 million people.  Experts Commets: Anjola Adeniyi, Technical Leader for EMEA at Securonix: “With this kind of illegal data sharing, mothers and babies may be unable to tell […]

Vulnerabilities Discovered In WPA3


It has been reported that ‘Dragonblood‘ vulnerabilities seep into WPA3 secure Wifi handshake. The research identified vulnerabilities in  early implementations of WPA3™-Personal, where those devices allow collection of side channel information on a device running an attacker’s software, do not properly implement certain cryptographic operations, or use unsuitable cryptographic elements. An attacker within range of a victim can still recover the password of the […]