Regtechtimes on MSN
No more moats: Rethinking risk in the age of identity & access
The castle-and-moat cybersecurity strategy might just be as outdated as it sounds. In a world where work happens on phones in ...
IBM urged customers to patch a critical authentication bypass vulnerability in its API Connect enterprise platform that could ...
Rated 9.8 out of 10 in severity, the flaw could allow a remote attacker to gain unauthorized access to applications.
In a security market crowded with tools, features, and AI promises, the most valuable post-holiday gift for CISOs is clarity, ...
2025 was supposed to be the year of the AI agent. Companies invested heavily in autonomous systems that could handle tasks ...
Fortinet has warned customers that threat actors are still actively exploiting a critical FortiOS vulnerability that allows ...
AI is reshaping identity security by proliferating non-human identities and weakening passwords. As enterprises prepare for ...
In a quarterly report filed with the U.S. Securities and Exchange Commission on November 14, 2025 ( SEC filing ), TREMBLANT CAPITAL GROUP disclosed a new position in CyberArk Software Ltd.
With online gaming booming, security is paramount. Check for HTTPS and padlocks when choosing platforms to keep your ...
As leaders begin implementing biometrics, passkeys and AI threat detection, there are several core design principles they ...
India's Aadhaar framework now formally allows face-based authentication, enhancing usability while tightening consent and data usage rules. New regulations prioritize offline verification and ...
The MFA landscape has changed dramatically. Methods that once felt “secure enough” like TOTP apps or push notifications are now being pressured by increasingly sophisticated attacks such as real-time ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results