Technology Pioneer Vikram Verma Joins SecureAuth as Chairman of the Board of Directors

Security in Plain English: What is a DDoS Attack? Part 2

  Last week we talked about what DDos attacks are and the lengths attackers go to to try and breach your ...
Mike Talon

Staying Secure at 30,000 Feet – Part Two

  In the first part of this blog, we reviewed how vulnerable you can be while traveling and on a public ...
Mike Talon

SAML Vulnerabilities: Canonicalization and DOM traversal

On February 27th, 2018 Duo Security posted a blog about a vulnerability they found in a number of SAML libraries ...
Jeff Hickman

TechCo’s 2018 Predictions for the Future of Tech

Tech innovations tend to be tied to visions of the future, from the Apple’s “sleek and white” house style, ...
Steve Goldberg

Understanding the real capabilities of unsupervised machine learning

“Hey, Siri. What is the capital of New York?” We all know what happens next — Siri provides the answer. How Siri ...
Steve Goldberg

The Rising Dangers of Unsecured IoT Technology

The Rising Dangers of Unsecured IoT Technology As government regulation looms, the security industry must take ...
Steve Goldberg

Machine Learning: A Primer

  Hey, Siri. What is the capital of New York?” We all know what happens next — Siri provides the answer. ...
David Ross

Uber Breach Highlights How We Aren’t Learning Our Lesson

As an individual working for an identity-based security company, it’s getting a little tiring to hear about yet ...
Ryan Rowcliffe

NIST, MFA and the Hokey Pokey

  The National Institutes of Science and Technology (NIST) routinely formulates guidelines for helping ...
Mike Talon

What the New Yahoo Breach Numbers Mean for You

Earlier this week, Yahoo announced that the data breach reported earlier this year did not impact 200+ million ...
Steve Goldberg

Biometrics: A Stepping-Stone To Eliminating The Password Forever

September 13, 2017 - Once thought of as exotic and futuristic, the use of biometrics as a means of ...
Steve Goldberg

Identity 101: A Quick Guide to the Top 12 Acronyms in Identity Management

Newcomers and old hands alike can feel a little lost in the alphabet soup of acronyms in the identity management ...
Mike Talon

Pin It on Pinterest