New York State Cybersecurity Guidelines (and how Adaptive Authentication can help)

Presented June 9, 2017, this webinar reviewed the guidelines set out by the State of New York in 23 NYCRR 500, including minimum requirements for access control, breach remediation, and cybersecurity programs. We discussed risk-based authentication and how can it detect anomalies or changes in patterns to require additional user verification, and how SecureAuth’s Adaptive Authentication helps detect the use of compromised credentials and speed breach remediation.

Get Ready to CONNECT with SecureAuth+Core Security in Atlanta

Ashley Sims

By now you’ve heard the news: SecureAuth and Core Security are joining forces to offer the industry’s first identity-based security automation platform with integrated network, endpoint, vulnerability, and identity security.

Identity 101: When "Good Enough" Just Isn't Good Enough

Mike Talon | @miketalonync


When looking at identity security solutions for your organization, you may find that many vendors offer native multi-factor authentication (MFA - also known as 2-factor authentication, or 2FA). When presented with the ability to do this by the app in question, why would you look at any other solutions? This is especially true when the product in question offers what seems to be "good enough" protection in the first place.

How Organizations Can Benefit from Adaptive Authentication


Robert Block, SecureAuth Sr. Vice President for Identity Strategy talks to CyberScoop about why two-factor authentication is cumbersome for organization's employees and how adaptive authentication is a better way for users and security



The Death of 2FA and the Birth of Modern Authentication

According to IDC, two-factor authentication (2FA) and multi-factor authentication (MFA) were born in a 'different day” and are based on technology that is now 20 years old. Organizations are encouraged to look at modern authentication solutions that adjust based on the level of risk, are invisible to users and remove dependency on the unreliable password.

SecureAuth Merges with Core Security

Jeff Kukowski, CEO


Today, we are excited to announce that SecureAuth and Core Security are merging to become one company. Core Security is a leader in vulnerability discovery, identity governance, and threat management, which is highly complementary to the identity security technology SecureAuth pioneered and continues to be a leader in today. Together, our mission is to accomplish what no other security technology vendor can claim: Secure the enterprise across all major threat vectors with an identity-based approach to the attack lifecycle.

Adaptive Access Control for Portal Protection

Protect your consumer, employee or partner portal against identity-based threats without unjustifiably interrupting your users.  Read this solution brief to learn more about SecureAuth adaptive access control for portal protection.

eBook: Secure Access Control for Office 365

It’s easy to understand why Office 365 is the most widely used cloud service in the world: applications are constantly updated, it’s easy-to-use, and comes at a relatively low cost. It’s also a prime target for would-be attackers. Chances are, your business is not only already at risk—your data is already threatened. One study reports that virtually every organization experiences at least one cloud-based threat each month and the average has soared to nearly six incidents every week.

SecureAuth Continues to Raise the Bar on Passwordless Authentication with New Access Control Methods


With new Link-to-Accept™ and YubiKey multi-factor authentication methods, SecureAuth is taking more organizations passwordless with the flexibility they need.