Identity 101: Thinking Beyond the Borders of the "Office"

Author: 
Mike Talon | @miketalonNYC

Thinking Beyond the Borders of the "Office"

Organizations exploring potential Identity Access and Management (IAM) solutions often begin by determining how best to control the login and other activities of users who are on their own internal networks and/or connected by Virtual Private Network (VPN). This is a great first step but poses several challenges to the modern enterprise that should not be overlooked. The sooner additional factors are considered, the better overall security the organization can deploy. 

Identity 101: What Are Geo-Location and Geo-Velocity?

Author: 
Mike Talon | @miketalonNYC

 

What Are Geo-Location and Geo-Velocity in Identity Authentication?

Geo-location and geo-velocity are just two of the pre-authentication risk checks included in SecureAuth’s adaptive access control solution. Geo-location and geo-velocity can both offer different levels of protection, and may be employed independently or in tandem; but what exactly are they and how do they work? 

Geo-Location

Identity 101: Creating a Secure Password

Author: 
Mike Talon | @miketalonync

 

We all hate passwords. Either you can't remember them, or you re-use the same one over and over to avoid forgetting it. Trying to come up with new passwords is a never-ending battle against human memory versus the potential for someone to guess the one you have. So how do you create secure passwords, and remember them? 

Over 1.1m E-Mail Addresses of Top UK Law Firms Found Dumped on Dark Web

Over 1.1m E-Mail Addresses of Top UK Law Firms Found Dumped on Dark Web

Over a million stolen e-mail addresses belonging to top 500 law firms in the UK were found dumped on the Dark Web, including 80,000 credentials stolen from select Magic Circle firms.

Stolen credentials found on the Dark Web were obtained by hackers after compromising third-party sites like LinkedIn or Dropbox where employees posted their e-mail addresses.

Security Answers in Plain English: Why Do I Have to Change my Password Every 30/60/90 Days?

Author: 
Mike Talon | @miketalonync

 

Why Do I Have to Change my Password Every 30/60/90 Days?

"My company makes me change my password every so often.  Why do they make me do this even if we haven't been breached or anything like that?"

The answer is simple, and there are two reasons why this policy is standard for most companies.  The first is protection against stuff that hasn't happened yet.  The second is protection against stuff that has happened - just not to your company.

Why Two-Factor Authentication Is Too Risky

Why Two-Factor Authentication Is Too Risky

SecureAuth's Jim Wangler on the Need for Risk-Based Multifactor Solutions

Two-factor authentication solutions face two problems: They are not widely adopted, and attackers find them far too easy to crack. What's the answer? New risk-based multifactor solutions, says Jim Wangler of SecureAuth.

Pages