SecureAuth Announces New Behavioral Modeling Patents to Fortify Passwordless
What Is SSO? How Single Sign-On Authentication Works

What Is SSO? How Single Sign-On Authentication Works

Proper authentication gains users access to the content and controls of web-based applications. But multiple ...
Fausto Oliveira
Two-step method: a step in the right direction, yet much more is needed

Two-step method: a step in the right direction, yet much more is needed

In a New York Times article last week, Brian X. Chen discussed the importance of consumers implementing two-factor ...
Stephen Cox
Removing Humans from the authentication process: The future of access protection

Removing Humans from the authentication process: The future of access protection

Humans are consistently the weakest link in protecting organizations from cyberattacks and data breaches. Humans ...
Damon Tepe
April Fools’ Day Prank For CISOs

April Fools’ Day Prank For CISOs

Question: Guess who is pregnant? Answer: <Insert friend’s name here as answer>! Response: shock or ...
Fausto Oliveira
Biometric Identification Vs. Biometric Authentication: Which Do You Need?

Biometric Identification Vs. Biometric Authentication: Which Do You Need?

Once upon a time, only spies used this technology to enter their lairs. Now, it's used to enter your smartphone: ...
Fausto Oliveira
Adaptive authentication during an attack

Adaptive authentication during an attack

SecureAuth on Adaptive Authentication Part 1: The benefits of adaptive authentication: The KuppingerCole ...
Stephen Cox

Never Miss a Beat
Subscribe to Our Blog

Pin It on Pinterest