Duncan Riley
Latest from Duncan Riley
Law enforcement tools company targeted following alleged data breach
The website of ODIN Intelligence LLC, a provider of law enforcement tools including a sex offender tracking system, was defaced on the weekend after it was claimed that the company was exposing law enforcement data online. First reported by TechCrunch, the defacement included a message that stated, “ACAB” and “no nations! no borders! we are ...
Amid calls for ban in US, TikTok puts forward $1.5B transparency plan
TikTok parent company ByteDance Ltd. has put forward a proposal to increase transparency amid ongoing calls for the app to be banned in the U.S. because of the company’s links to the Chinese government. The Wall Street Journal reported today that in talks with lawmakers and others, TikTok has put forward details of a $1.5 billion ...
Twitter reportedly cuts off API access to third-party apps in intentional move
Twitter Inc. has reportedly cut off third-party services from accessing its application programming interface in an apparently intentional move. Third-party services that rely on the Twitter API for access were first reported to have issues as early as Thursday night, with the apparent outage continuing into the weekend. The API, in this case, gives third-party ...
AuthID-Okta integration assists in eliminating passwords and preventing unauthorized access
Biometric identity and authentication solutions provider authID Inc. today announced the integration of its Verified CloudConnect service with Okta Inc.’s Workforce Identity Cloud and the expanded availability of Verified 3.0’s full capabilities with Okta Customer Identity Cloud. Verified CloudConnect complements Okta’s Workforce and Customer Identity and Access Management platforms to secure desktop and mobile devices with ...
Expanded Cloudflare-Microsoft relationship helps organizations enhance zero-trust security
Content delivery network provider Cloudflare Inc. today announced an expansion of its relationship with Microsoft Corp. to help customers deploy, automate and enhance their organization’s zero-trust security. The new integrations between Cloudflare and Microsoft allow customers to deploy zero-trust security tools in minutes, with no complex code changes. The integration also includes claimed industry-first features, ...
Genesis, Gemini and Nexo targeted in latest action against crypto companies
Three cryptocurrency-related firms — Genesis Global Capital LLC, Gemini Trust Co. LLC and Nexo Inc. — are facing legal issues as law enforcement goes after companies in the sector as the fallout from the failure of FTX Trading Ltd. continues. In the U.S., both Genesis and Gemini have been charged by the Securities and Exchange ...
SailPoint acquires identity solutions startup SecZetta
SailPoint Technologies Inc. today announced it has acquired identity solutions startup SecZetta Inc. for an undisclosed sum. Founded in 2019, SecZetta offers a third-party risk solution product designed to assist organizations in implementing a risk-based identity lifecycle process. The company’s solution allows organizations to collect third-party, non-employee data from internal and external sources to create ...
Ava Labs teams with AWS for one-click Avalanche blockchain node deployment
Blockchain startup Ava Labs Inc. has teamed with Amazon Web Services Inc. in a partnership that aims to accelerate enterprise, institutional and government adoption of blockchain. Under the partnership, announced today, AWS will support Ava’s Avalanche infrastructure and decentralized application ecosystem, including one-click node deployment through the AWS Marketplace. Avalanche node operators can also run AWS ...
Cisco warns customers of critical vulnerabilities in small business routers
Cisco Systems Inc. today warned customers of two critical vulnerabilities in the web management interface of some of its small business routers that could allow a remote attacker to gain access to a targeted device. The vulnerabilities have been found in Cisco Small Business RV016, RV042, RV042G and RV082 routers. Using the access, an attacker can ...









