SecureAuth Blog

SecureAuth Unveils Cloud-based Identity Service Using Adaptive Access Control

August 24, 2016 | By: SecureAuth

SecureAuth is excited to announce a new offering, SecureAuth Cloud Access. A cloud-based identity service that focuses on user convenience, strengthening security, and reducing administration for SaaS application use at your organization. Our new Identity-as-a-Service (IDaaS) offering combines Single Sign-On (SSO), Multi-factor Authentication (MFA), Adaptive (risk-based) Authentication, and administration tools to help you harness and secure SaaS application use and business agility.

Gartner’s Top IT Security Predictions

August 09, 2016 | By: Craig Lund, CEO

Revealed during the Gartner Security and Risk Management Summit, analyst Earl Perkins announced his top 10 predictions for IT security in five key areas of security concern. The topic most of interest to me – and the reason I write to you now – is the arena of identity and access management (IAM), for which Perkins shared 2 predictions.

NIST 800-63B: deprecating the use of out-of-band SMS for two-factor authentication

July 27, 2016 | By: Keith Graham, CTO

This week, NIST announced 800-63B - a draft special publication named ‘Digital Authentication Guideline’ for ‘Authentication and Lifecycle Management’. Within this draft, NIST is deprecating their recommendation of using SMS as a delivery mechanism for one-time-passcodes as an out-of-band authentication method.

The Rise of California Cybercrime: Protecting Customers with Multifactor Authentication

July 18, 2016 | By: SecureAuth

California has always been a king of innovation - from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it's not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003.

Adaptive Authentication - High Security for the Organization, Low Friction for the User

July 06, 2016 | By: James Romer

As any reputable security vendor will admit, there is no silver bullet to solving the challenges of today’s evolving enterprise boundary. With that in mind, how can the security industry rise to the challenge? Can we as security vendors provide a secure solution, without creating unnecessary user friction?

A Look at Recommendations from Mandiant/FireEye M-Trend’s 2016 report

June 14, 2016 | By: Brian Bowden

In February of this year Mandiant/FireEye released its M-Trend’s 2016 report. This is a great report that is split into three different sections. The first section chronicles the top three newest breach trends that occurred in 2015, the second looks at past trends that have turned constant, and finally the report discusses the top three observations Mandiant’s Red Team has seen when performing penetration test for clients. In each section of the report there are great examples of why...

Protecting Your Organization from the Criminal Intent of Anonymous Networks

June 09, 2016 | By: Damon Tepe

Let’s start off by saying not all activity from anonymous networks, like Tor, are mal-intentioned. There are plenty of good intentioned uses of anonymous networks, used to hide the true identity of the user, like journalism, military, law enforcement, and just plain privacy (Facebook uses the Tor network).

Bringing Sexy (and PCI Compliance) Back

May 17, 2016 | By: Stephen Cox

In late April, the Payment Card Industry (PCI) Security Standards Council announced an update of its Data Security Standard (DSS). Included among the changes were extended requirements for multifactor authentication.

Determine Identities with Confidence…every time.

May 13, 2016 | By: Darin Pendergraft

Do you know who’s on your network and logging into your apps? Your employees, partners and customers, right? Are you sure it’s just them? How do you know? Because they have a valid username and password? Our research has shown that stolen or compromised credentials are used in 90% of all cyber attacks.

2016 DBIR – Stolen Credentials Pivotal In Modern Attacks

May 10, 2016 | By: Stephen Cox

Each year, Verizon releases its Verizon Data Breach Investigations Report, or DBIR. The report details findings Verizon has collected throughout the year regarding incident response activity undertaken by the company. The report is highly anticipated and offers a wealth of information on attackers and their tactics, techniques and procedures (TTPs).

1 2 3 4 5 6 7 ... >