Authentication

The Password is Dead?


The password is dead, or at least that was what Bill Gates proclaimed in 2004. Since then, the password has been declared defunct many times by industry leaders and pundits. Death knells for the much maligned, but much used passwords have now reached a frantic level. Despite the strident proclamations of the demise of...

Authentication Fundamentals

Adaptive, Risk-Based Authentication — Your Questions, Answered


The need to secure your business information, systems and access is more critical than ever. At the same time, you must balance the need for enhanced security against the accessibility and productivity needs of your employees. Get the balance right and you...

Authentication

9 Signs Behavioral Biometrics are the Next Big Thing in Authentication


Did you know that when it comes to user authentication, there are actually two types of biometric categories? Many are familiar with “inherited traits” like our fingerprints, irises and face recognition. We’re born with these and some change...

Authentication

4 Ways to a Better Workplace with Composite Authentication


A productive, better workplace. We all want one. While pondering this topic, your mind likely doesn’t drift to the password and access policies of your organization. However improbable it may seem, re-thinking a chore that every user in your organization...

Authentication

Biometric Technology Gaining Traction in User Authentication


...

Authentication

Why You Should Consider FIDO Universal 2-Factor Authentication


Most IT and cybersecurity professionals have at least occasional anxiety about when the next major virus, ransomware or swarm bot will hit. With the bulk of data breaches occurring at the network perimeter—as users get their emails and go online—user...