Binary Versus Continuous Authentication

From ancient to modern times, the concept of a gatekeeper, bouncer or[...]

Evaluating Multi-factor Authentication Solutions Today

“Complicated” doesn’t equate to “better” (or even “more secure”) when it[...]

The 3 Benefits of Multi-Factor Identity Authentication for Your Business

Are you aware that last year, data breaches jumped 29% in the first six[...]

4 Cybersecurity Trends on the Horizon in 2019

Cybersecurity trends evolve as fast as cybertechnology. It's hard to keep up.

Credential Stuffing And Account Takeovers, Oh My

If you are an American Chief Information Security Officer (CISO) or IT[...]

Why Your Business Needs Identity and Access Management

Identity theft is rampant. In 2017, over 16.7 million consumers in the[...]

Beyond the Password: What Other Identity Authentication Technologies Are There?

What if you put your entire company at risk because your identity[...]

The Evolution of Identity Authentication

Your login credentials have been compromised. Your passwords have been[...]

StatCounter breached by hackers to Steal Bitcoins

Hackers are getting more sophisticated each and every day. In more recent[...]

Why IT Needs New Unified Security Architecture Strategy

Citrix and The Ponemon Institute conducted a study of over 4,268 leading IT[...]