The 3 Types of Multi-Factor Authentication


Did you know that more than 80% of cyber attacks involve the use of[...]

Egocentric Versus Allocentric Artificial Intelligence

Have you ever noticed that you make different decisions about a person or[...]

5 Stages Of Machine Learning For Identity Authentication

1984 was the year George Orwell predicted a dystopian future that didn’t[...]

BrightTALK Webcast: Cyber Security Battles: How to Prepare and Win

Cyber Security Battles: How to Prepare and Win

How Much Is Too Much Authentication?

Nothing exceeds like excess. Most people take this credo to extremes as[...]

Process Versus Event-Driven Authentication

The simple definition of an event is the result of something happening. The[...]

Maybe Too Smart: Do the Benefits of Artificial Intelligence Outweigh the Risks?

It’s estimated that Artificial Intelligence (AI) will be a $47 billion[...]

Over 2 Billion Served

Back in 1994 MacDonald’s was proud to announce their 100billionth hamburger[...]

The Password Is Dead: The End of Password Logins, and What Will Replace Them

Did you make sure to add a capital letter, two special characters, a[...]

Almost 22 Million More Passwords Leaked

Size matters. You have heard this with respect to many things in the[...]