A New Chapter Unfolds: SecureAuth Announces Acquisition of Cloudentity
Why Browser Fingerprinting is Creating Challenges for Identity Security

Why Browser Fingerprinting is Creating Challenges for Identity Security

Uniquely identifying the user’s device or browser when accessing an online resource can be useful in very ...
Martin Gallo
What Are the Main Differences Between Phishing and Spoofing?

What Are the Main Differences Between Phishing and Spoofing?

One of the unprecedented effects of the COVID-19 outbreak is that thousands of people now work from home (and have ...
Tram Nguyen
What Is Biometrics And Why Collecting Biometrics Data Is Risky

What Is Biometrics And Why Collecting Biometrics Data Is Risky

The use of biometric data for security and privacy is an old idea in a new age wrapper. Examples of biometric ...
Tram Nguyen
Cyber Defense Magazine: Your Passwords Have Already Been Hacked

Cyber Defense Magazine: Your Passwords Have Already Been Hacked

A timely piece given World Password Day is this week.
Tram Nguyen
5 Tips That Will Help Thwart Malicious Brute Force Hacking Attacks

5 Tips That Will Help Thwart Malicious Brute Force Hacking Attacks

Today, brute force hacking attacks are the most popular way that cybercriminals are spreading ransomware. (more…)
Tram Nguyen
The SecureAuth 2020 State of Identity Report

The SecureAuth 2020 State of Identity Report

By Paul Wiederkehr – Product Marketing, SecureAuth The growth of the Internet has been nothing short of ...
Paul Wiederkehr

Never Miss a Beat
Subscribe to Our Blog

Pin It on Pinterest