CISO’s Guide to Multi-Factor Authentication

CISO’s Guide to Multi-Factor Authentication

Who became a CISO to manage as many passwords as possible? Or spend their whole security budgetto password ...
Donovan Blaylock II
Authentication and PCI DSS

Authentication and PCI DSS

When the average executive is asked about the highest risk in their cybersecurity posture, it’s not surprising ...
Donovan Blaylock II
Representing Your Unique Self

Representing Your Unique Self

When presenting or more often representing yourself online to a service, how do you prove that you are you? It’s ...
Donovan Blaylock II
What to Consider When Evaluating MFA and CIAM Vendors

What to Consider When Evaluating MFA and CIAM Vendors

Advice from Gartner’s Market Guide for User Authentication  By 2023, 60% of large and global enterprises, and ...
Donovan Blaylock II
Trust Fully Scrutinized

Trust Fully Scrutinized

Trust Breakdown 2020 is seared into our collective memories. Challenging? Tumultuous? Pivotal? Words alone fail to ...
Donovan Blaylock II
Imposters are Among Us, Identify and Vote them Out with Continuous Authentication

Imposters are Among Us, Identify and Vote them Out with Continuous Authentication

In a world where identity is persistently attacked, your credentials have already been compromised, or soon will ...
Donovan Blaylock II
Zero Trust Identity: CIAM for Improved Consumer Trust and Customer Experience

Zero Trust Identity: CIAM for Improved Consumer Trust and Customer Experience

A recent study conducted by Javelin Strategy & Research found account takeovers (ATOs) are trending at the ...
Donovan Blaylock II
Rethinking MFA: Continuous security monitoring beyond devices

Rethinking MFA: Continuous security monitoring beyond devices

Your organization likely has some form of continuous security monitoring in place in order to give IT security ...
Donovan Blaylock II
The Cost of Passwords

The Cost of Passwords

The story of the password starts in 1961, when Dr. Fernando Corbató utilized unique codes to secure file access on ...
Donovan Blaylock II
Biometric Update: Analyze biometrics and behavior with ML to defeat professional attackers, Acceptto security expert urges

Biometric Update: Analyze biometrics and behavior with ML to defeat professional attackers, Acceptto security expert urges

Cybercrime has become a lucrative business employing professional criminals, and harnessing advanced technologies ...
Donovan Blaylock II
What Are the Latest Security Threats Facing the BYOD Trend?

What Are the Latest Security Threats Facing the BYOD Trend?

More companies are implementing Bring Your Own Device policies for employees. A BYOD policy allows employees to ...
Donovan Blaylock II
How the Cybersecurity Industry Is Adapting to the Coronavirus Pandemic

How the Cybersecurity Industry Is Adapting to the Coronavirus Pandemic

There is a cybersecurity attack almost every 40 seconds. It shows how prevalent cybersecurity attacks are and the ...
Donovan Blaylock II

Pin It on Pinterest