Imposters are Among Us, Identify and Vote them Out with Continuous Authentication

In a world where identity is persistently attacked, your credentials have[...]

Zero Trust Identity: CIAM for Improved Consumer Trust and Customer Experience

A recent study conducted by Javelin Strategy & Research found account[...]

Rethinking MFA: Continuous security monitoring beyond devices

Your organization likely has some form of continuous security monitoring in[...]

The Cost of Passwords

The story of the password starts in 1961, when Dr. Fernando Corbató utilized

Biometric Update: Analyze biometrics and behavior with ML to defeat professional attackers, Acceptto security expert urges

Cybercrime has become a lucrative business employing professional criminals,[...]

What Are the Latest Security Threats Facing the BYOD Trend?

More companies are implementing Bring Your Own Device policies for[...]

How the Cybersecurity Industry Is Adapting to the Coronavirus Pandemic

There is a cybersecurity attack almost every 40 seconds. It shows how[...]

What Is Frictionless Access Control And Is It The Future?

No matter how far we advance in the future and no matter what sort of[...]

What Are the Main Differences Between Phishing and Spoofing?

One of the unprecedented effects of the COVID-19 outbreak is that thousands[...]

What Is Biometrics And Why Collecting Biometrics Data Is Risky

The use of biometric data for security and privacy is an old idea in a new[...]