What's Better Than 2FA?

Authentication in the digital world is a tricky business. While everyone[...]

IT Security Is NOT A Binary Decision

Yes or no? Good or bad? Applicable or not applicable? Permissible or not[...]

The Cost Of Identity Breaches

Cyndi Lauper made famous a song written by Thomas Gray called “Money Changes[...]

Continuous Authentication = Continuous Protection

There was a point in time where IT security mimicked the concepts of[...]

Managing Customer Portal Authentication

Knock, knock. Who’s there? Robin. Robin who? Robin YOU, now hand over the[...]

Acceptto featured in EMA's Top 3 Identity Management Report

We are thrilled to be highlighted as one of the top solutions for Identity[...]

Why Are You Still Using Passwords When They've Already Been hacked?

It is beyond imagination to understand that we are still having discussions[...]

A Case For Continuous Cognitive Authentication

In today’s day and age your digital identity is one of the most important[...]

How Much Is Too Much Authentication?

Nothing exceeds like excess. Most people take this credo to extremes as[...]

Process Versus Event-Driven Authentication

The simple definition of an event is the result of something happening. The[...]