![The Rise of Consent and Other Application-based Phishing Attacks](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2021/08/phishing-hero-blog.jpg)
August 10, 2021
The use of application-based phishing campaigns is not new in the threat landscape, and there have been a couple ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2018/10/MGallo-Headshot.jpg)
Martin Gallo
![SecureAuth Partners with Cyberlinx in the Middle East to Further Protect Digital Identities](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2021/07/cyberlinx-hero-blog.jpg)
August 03, 2021
SecureAuth, a leader in identity security and Cyberlinx, a leading Value-Added Distributor (VAD) of cyber security ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2021/07/angela1.jpg)
Angela Roberts
![Is Re-Authentication the Gateway to the New Shadow IT?](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2022/05/Shadow-IT-Blog-1080x715.jpg)
July 30, 2021
Remember the emergence of Shadow IT and Bring-Your-Own-Device (BYOD)? Both are born out of the friction created ...
![The Arms Race of Browser Fingerprinting](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2021/07/1000x325_Blog_BrowserFingerprints_v3.png)
July 20, 2021
Note: This blog was co-authored by SecureAuth Security Researcher: Leandro Cuozzo.
The term browser ...
![](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2021/07/Florencia-Rao.jpeg)
Florencia Rao
![Why Deploying Multi-Factor Authentication is Essential for Identity Security](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2021/07/MFA-hero-2-web-1080x351.jpg)
July 07, 2021
Deploying multi-factor authentication is a foundational step to improve identity security for organizations in ...
![How to Stay Protected Against The Latest Scourge of Ransomware](https://secureauthcorp.wpenginepowered.com/wp-content/uploads/2022/05/Ransomware-Blog-6.24.png)
June 24, 2021
In the last decade, ransomware has exploded. Gone are the days when criminals would only attack consumer PCs, ...