Authentication and GDPR: Covering the Bases

Author: 
SecureAuth + Core Security

 

The European General Data Protection Regulation (GDPR) will take effect on May 18, 2018. The GDPR requires businesses to comply with new rules for collecting, sharing, and protecting personal data within the borders of the European Union (EU) or when exporting information internationally. This applies to any organization that processes personal data of EU citizens, regardless of where that business is located. All companies that do business in Europe will be required to implement a range of security measures.

Symbol-to-Accept: The Newest Innovation in Mobile-Based Authentication

Author: 
Damon Tepe

 

User-friendly Symbol-to-Accept provides the same great user experience as Push-to-Accept while closing critical security gaps

Why Healthcare Cannot Afford to Rely on Two-Factor Authentication

 

Why Healthcare Cannot Afford to Rely on Two-Factor Authentication

Healthcare is now the most vulnerable industry to data breaches, with 328 breaches in 2017 alone (accounting for 60% percent of all breaches last year). The total estimated cost of these breaches reached $1.2 billion. 

SecureAuth IdP Adaptive Access Control


How does modern adaptive authentication control work? Watch our intro video and learn more how to prevent the misuse of credentials with SecureAuth + Core Security adaptive multi-factor authentication.


OTHER TRENDING TOPICS

Beyond Two-Factor Authentication  |  Go Passwordless  |  SecureAuth IdP  |  SecureAuth IdP Protects Office 365

Identity 101: Why Two-Factor Authentication Is Not Enough

 

Identity 101: Why Two-Factor Authentication Is Not Enough

Keith Graham, Chief Technology Officer, SecureAuth, examines some attacks which exploit today's trade-off for easy user experience.

Staying Secure at 30,000 Feet - Part One

Author: 
Mike Talon | @miketalonNYC

Staying Secure at 30,000 Feet - Part One

How do you protect the credentials on your device, while using Wi-Fi on an airplane or even while riding the train? As airplanes and trains are now being equipped with Wi-Fi access, the concern of your device being secure has grown. Even if your plane isn't Wi-Fi enabled, there's a good chance you will be tempted to sign into the airport Wi-Fi prior to your flight.

Identity 101: Thinking Beyond the Borders of the "Office"

Author: 
Mike Talon | @miketalonNYC

Thinking Beyond the Borders of the "Office"

Organizations exploring potential Identity Access and Management (IAM) solutions often begin by determining how best to control the login and other activities of users who are on their own internal networks and/or connected by Virtual Private Network (VPN). This is a great first step but poses several challenges to the modern enterprise that should not be overlooked. The sooner additional factors are considered, the better overall security the organization can deploy. 

Identity 101: What Are Geo-Location and Geo-Velocity?

Author: 
Mike Talon | @miketalonNYC

 

What Are Geo-Location and Geo-Velocity in Identity Authentication?

Geo-location and geo-velocity are just two of the pre-authentication risk checks included in SecureAuth’s adaptive access control solution. Geo-location and geo-velocity can both offer different levels of protection, and may be employed independently or in tandem; but what exactly are they and how do they work? 

Geo-Location

Identity 101: Creating a Secure Password

Author: 
Mike Talon | @miketalonync

 

We all hate passwords. Either you can't remember them, or you re-use the same one over and over to avoid forgetting it. Trying to come up with new passwords is a never-ending battle against human memory versus the potential for someone to guess the one you have. So how do you create secure passwords, and remember them? 

Pages