article thumbnail

Bitwarden acquires Passwordless.dev to help companies authenticate users without passwords

TechCrunch

Open source password management platform Bitwarden has made its first known acquisition, snapping up a fledgling Sweden-based startup called Passwordless.dev , which specializes in helping developers integrate passwordless authentication technology into their software. Image Credits: Passwordless.dev. .

article thumbnail

How to gain a five star security reputation in hospitality

CIO

Achieving and sustaining compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a daunting challenge for hotels because they handle many complex payment business cases. For example, consider the numerous new booking options and services to improve the customer’s experience during the reservation process and their stay.

Hotels 263
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

14 essential book recommendations by and for IT leaders

CIO

Why not pick up a book that will inspire you to be a more effective leader, help you spot challenges and pitfalls in your IT strategies and processes, or prepare for the future of information technology? And this group of CIOs, CTOs, and technical CEOs have strong favorites — books they turn to again and again for inspiration.

CTO Coach 326
article thumbnail

3 ways to deter phishing attacks in 2023

CIO

In fact, CIO has reported that it takes only a few minutes for experienced hackers to set up a social engineering attack against enterprises (and their managed service providers) that consider themselves to be secure and protected. What methods are cybersecurity experts using to minimize the impact of these attacks? Let’s dig deeper.

Security 352
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

From reel to real: Translating movie magic into cybersecurity realities

Lacework

But for those of us with a passion for cybersecurity, we can’t help but view these celebrated movies through a unique lens, scrutinizing every detail in high-tech scenes. AI doesn’t need self-awareness to pose a cybersecurity threat, but it’s not exactly plotting world domination either — at least not outside of the movies.

Film 52
article thumbnail

Telehealth and Cybersecurity: 3 Best practices to ensure data security in remote patient care

Trigent

Patients can book appointments for the same day and for a future date. While the latter can be resolved through user education or caregiver-assisted consultations, cybersecurity is a bigger problem. Access to healthcare and information from anywhere increases the threat surface and the associated security risk.