May 14, 2018
Most organizations are having a tough time striking a balance between maintaining the strong security ...
May 01, 2018
Last week, we discussed the potential problems businesses run into when it comes to identity sprawl. ...
April 25, 2018
The IT world is fairly familiar with the idea of sprawl – especially when it comes to the virtual ...
April 16, 2018
The European General Data Protection Regulation (GDPR) will take effect on May 18, 2018. The GDPR ...
April 05, 2018
User-friendly Symbol-to-Accept provides the same great user experience as Push-to-Accept while closing critical ...
March 29, 2018
Healthcare is now the most vulnerable industry to data breaches, with 328 breaches in 2017 alone ...
March 07, 2018
Keith Graham, Chief Technology Officer, SecureAuth, examines some attacks which exploit today's trade-off for easy ...
February 21, 2018
In 2017, we saw a new influx of spectacular and devastating breaches. Somewhat lost in the chaos was a surprising ...
February 14, 2018
Thinking Beyond the Borders of the "Office"
Organizations exploring potential Identity Access and Management ...
February 06, 2018
What Are Geo-Location and Geo-Velocity in Identity Authentication?
Geo-location and geo-velocity are just two of ...
January 29, 2018
Over a million stolen e-mail addresses belonging to top 500 law firms in the UK were found dumped on the Dark Web, ...
January 23, 2018
Security in Plain English Series
What is Two-Factor Authentication?
Why Do I Have to Change my Password Every ...