A New Chapter Unfolds: SecureAuth Announces Acquisition of Cloudentity
The Rise of Consent and Other Application-based Phishing Attacks

The Rise of Consent and Other Application-based Phishing Attacks

The use of application-based phishing campaigns is not new in the threat landscape, and there have been a couple ...
Martin Gallo
SecureAuth Partners with Cyberlinx in the Middle East to Further Protect Digital Identities

SecureAuth Partners with Cyberlinx in the Middle East to Further Protect Digital Identities

SecureAuth, a leader in identity security and Cyberlinx, a leading Value-Added Distributor (VAD) of cyber security ...
Angela Roberts
Is Re-Authentication the Gateway to the New Shadow IT?

Is Re-Authentication the Gateway to the New Shadow IT?

Remember the emergence of Shadow IT and Bring-Your-Own-Device (BYOD)? Both are born out of the friction created ...
Tram Nguyen
The Arms Race of Browser Fingerprinting

The Arms Race of Browser Fingerprinting

Note: This blog was co-authored by SecureAuth Security Researcher: Leandro Cuozzo. The term browser ...
Florencia Rao
Why Deploying Multi-Factor Authentication is Essential for Identity Security

Why Deploying Multi-Factor Authentication is Essential for Identity Security

Deploying multi-factor authentication is a foundational step to improve identity security for organizations in ...
Tram Nguyen
How to Stay Protected Against The Latest Scourge of Ransomware

How to Stay Protected Against The Latest Scourge of Ransomware

In the last decade, ransomware has exploded. Gone are the days when criminals would only attack consumer PCs, ...
Tram Nguyen

Never Miss a Beat
Subscribe to Our Blog

Pin It on Pinterest