A New Chapter Unfolds: SecureAuth Announces Acquisition of Cloudentity
Best Practices for Adaptive Authentication

Best Practices for Adaptive Authentication

SecureAuth on Adaptive Authentication Part 1: The benefits of adaptive authentication: The KuppingerCole ...
Stephen Cox
Understanding the Difference Between Inference and Prediction With AI

Understanding the Difference Between Inference and Prediction With AI

Often people will confuse prediction with inference. While the differences are actually very subtle, they have ...
Tram Nguyen
What Is SSO? How Single Sign-On Authentication Works

What Is SSO? How Single Sign-On Authentication Works

Proper authentication gains users access to the content and controls of web-based applications. But multiple ...
Tram Nguyen
Two-step method: a step in the right direction, yet much more is needed

Two-step method: a step in the right direction, yet much more is needed

In a New York Times article last week, Brian X. Chen discussed the importance of consumers implementing two-factor ...
Stephen Cox
Removing Humans from the authentication process: The future of access protection

Removing Humans from the authentication process: The future of access protection

Humans are consistently the weakest link in protecting organizations from cyberattacks and data breaches. Humans ...
Damon Tepe
April Fools’ Day Prank For CISOs

April Fools’ Day Prank For CISOs

Question: Guess who is pregnant? Answer: <Insert friend’s name here as answer>! Response: shock or ...
Tram Nguyen

Never Miss a Beat
Subscribe to Our Blog

Pin It on Pinterest