Cognitive Authentication for Solvency II and STS Compliance

Government regulations have a tendency to push the burden of complete[...]

A Case For Continuous Cognitive Authentication

In today’s day and age your digital identity is one of the most important[...]

Biobehavioral Authentication vs. SSO Security: Why Choose Biobehavorial Authentication

How seriously does your company take cybersecurity? Have you gotten hacked?

Understanding the Difference Between Inference and Prediction With AI

Often people will confuse prediction with inference. While the differences[...]

What Is SSO? How Single Sign-On Authentication Works

Proper authentication gains users access to the content and controls of[...]

April Fools' Day Prank For CISOs

Question: Guess who is pregnant? Answer: <Insert friend’s name here as[...]

Biometric Identification Vs. Biometric Authentication: Which Do You Need?

Once upon a time, only spies used this technology to enter their lairs. Now,[...]

The 3 Types of Multi-Factor Authentication


Did you know that more than 80% of cyber attacks involve the use of[...]

Egocentric Versus Allocentric Artificial Intelligence

Have you ever noticed that you make different decisions about a person or[...]

5 Stages Of Machine Learning For Identity Authentication

1984 was the year George Orwell predicted a dystopian future that didn’t[...]