Authentication

The Password is Dead?


The password is dead, or at least that was what Bill Gates proclaimed in 2004. Since then, the password has been declared defunct many times by industry leaders and pundits. Death knells for the much maligned, but much used passwords have now reached a frantic level. Despite the strident proclamations of the demise of...

Authentication Fundamentals

How to Find the Best Identity and Access Management Solution in 2019


Identity and access management (IAM) — ensuring that only the right people have the right access to the right systems at the right time — is a vital part of any organization’s cybersecurity. Properly-implemented identity and access management can...

Authentication

The Future of Authentication: Six Predictions for 2019


Most of us are sick of passwords. Some would say they are already dying a slow death and that their demise can’t come soon enough. The risks and costs of data theft resulting from password-related hacking are too high and have been for a very long time....

Authentication

Leaky Circuits: Addressing Cybersecurity Challenges in MENA Oil and Gas


In the proactive pursuit of efficiency, we have created a fully digitized world. And nowhere are the potential vulnerabilities of this approach more apparent than in the Middle East and North Africa (MENA) energy sector where robots, remotely controlled...

Authentication

Multifactor Authentication is a Must for Keeping Your GDPR Advantage


We’re now well into the GDPR era. Is your company GDPR compliant? If so, congratulations! You’ve conquered what can be a daunting (and costly) process for companies that handle the personally identifiable information (PII) European Union (EU) residents....

Authentication

Simplicity + Security: Biometric Face Authentication Offers Both


Planning a user authentication strategy is a balancing act, requiring organizations to reconcile strong data security with users’ demands for convenient data access. Biometric face authentication is quickly becoming the go-to. Passwords are a perfect example...