What Is SSO? How Single Sign-On Authentication Works

Proper authentication gains users access to the content and controls of[...]

April Fools' Day Prank For CISOs

Question: Guess who is pregnant? Answer: <Insert friend’s name here as[...]

Biometric Identification Vs. Biometric Authentication: Which Do You Need?

Once upon a time, only spies used this technology to enter their lairs. Now,[...]

The 3 Types of Multi-Factor Authentication


Did you know that more than 80% of cyber attacks involve the use of[...]

Egocentric Versus Allocentric Artificial Intelligence

Have you ever noticed that you make different decisions about a person or[...]

5 Stages Of Machine Learning For Identity Authentication

1984 was the year George Orwell predicted a dystopian future that didn’t[...]

BrightTALK Webcast: Cyber Security Battles: How to Prepare and Win

Cyber Security Battles: How to Prepare and Win

How Much Is Too Much Authentication?

Nothing exceeds like excess. Most people take this credo to extremes as[...]

Process Versus Event-Driven Authentication

The simple definition of an event is the result of something happening. The[...]

Maybe Too Smart: Do the Benefits of Artificial Intelligence Outweigh the Risks?

It’s estimated that Artificial Intelligence (AI) will be a $47 billion[...]