SecureAuth Wins 2022 Top 50 Best Workplaces of Year

Managing the Transition to Passwordless Authentication

Managing the Transition to Passwordless Authentication

Advances in passwordless authentication technology now make it possible for organizations to enable passwordless ...
Paul Wiederkehr
Would you ever consider username and MFA authenticator as a true 2-factor passwordless authentication?

Would you ever consider username and MFA authenticator as a true 2-factor passwordless authentication?

We often talk about the passwordless experience. For IT and IAM professionals the term passwordless is an ...
Dusan Vitek
Rethinking MFA: Continuous security monitoring beyond devices

Rethinking MFA: Continuous security monitoring beyond devices

Your organization likely has some form of continuous security monitoring in place in order to give IT security ...
Shahrokh Shahidzadeh
The First Step is Always the Hardest – Passwordless is a Journey

The First Step is Always the Hardest – Passwordless is a Journey

The most difficult step ever is the first step. It comes with doubts, uncertainties, and all sorts of fears. If ...
Paul Wiederkehr
Exploring the SAP HANA SQL Command Network Protocol – Federated Authentication

Exploring the SAP HANA SQL Command Network Protocol – Federated Authentication

We continue our journey into SAP security topics. The following is the third part of a series exploring the HANA ...
Martin Gallo
DOJ charges two men for involvement in hacking of NFL and NBA players social media accounts

DOJ charges two men for involvement in hacking of NFL and NBA players social media accounts

Two men will appear in federal court to face charges that they were involved in the unauthorized takeover of ...
Shahrokh Shahidzadeh

Never Miss a Beat
Subscribe to Our Blog

Pin It on Pinterest