Breaking The Password Addiction

Addictions can be attached to pretty much anything and everything. From[...]

What is Continuous Authentication, and What Can It Do for Your Business?

Far from being a plot point in a science fiction film, cybercrime is a real[...]

One Misused Valid Digital Credential Costs $Millions

There is a great line in Ready Player One where Aech warns Parzival about[...]

FIDO Standards Make Authentication Easier

Most people around the world recognize “FIDO” as a famous Italian dog from[...]

What Is Identity Authentication and How Can It Protect Your Business

With around 16.7 million victims of identity theft online in 2017 alone, you[...]

The Top 3 Cryptography and Network Security Predictions for 2019

Guard your systems. 

That's the state of mind you need have moving into[...]

Biometric Authentication Not As Safe As You Think

Unique: Noun: The quality of being one and only of its kind. This is the[...]

What Is a Security Breach? And How Can You Protect Your Data?

If you think you've been seeing security breaches in the headlines more[...]

Machine Learning vs Artificial Intelligence: What's the Difference?

One of the most profound risks to the global job market is artificial[...]

Cognitive Authentication For PCI Compliance

One New Year’s resolution that every retailer needs to add to their list as[...]