Technology Pioneer Vikram Verma Joins SecureAuth as Chairman of the Board of Directors
Understanding the Difference Between Inference and Prediction With AI

Understanding the Difference Between Inference and Prediction With AI

Often people will confuse prediction with inference. While the differences are actually very subtle, they have ...
Steve Goldberg
What Is SSO? How Single Sign-On Authentication Works

What Is SSO? How Single Sign-On Authentication Works

Proper authentication gains users access to the content and controls of web-based applications. But multiple ...
Steve Goldberg
Two-step method: a step in the right direction, yet much more is needed

Two-step method: a step in the right direction, yet much more is needed

In a New York Times article last week, Brian X. Chen discussed the importance of consumers implementing two-factor ...
Stephen Cox
Removing Humans from the authentication process: The future of access protection

Removing Humans from the authentication process: The future of access protection

Humans are consistently the weakest link in protecting organizations from cyberattacks and data breaches. Humans ...
Damon Tepe
April Fools’ Day Prank For CISOs

April Fools’ Day Prank For CISOs

Question: Guess who is pregnant? Answer: <Insert friend’s name here as answer>! Response: shock or ...
Steve Goldberg
Biometric Identification Vs. Biometric Authentication: Which Do You Need?

Biometric Identification Vs. Biometric Authentication: Which Do You Need?

Once upon a time, only spies used this technology to enter their lairs. Now, it's used to enter your smartphone: ...
Steve Goldberg

Never Miss a Beat
Subscribe to Our Blog

Pin It on Pinterest