A New Chapter Unfolds: SecureAuth Announces Acquisition of Cloudentity

Identity 101: A Quick Guide to the Top 12 Acronyms in Identity Management

Newcomers and old hands alike can feel a little lost in the alphabet soup of acronyms in the identity management ...
Mike Talon
New Reports show Office 365 Adoption – and Attacks – on the Rise

New Reports show Office 365 Adoption – and Attacks – on the Rise

  It’s no surprise that Office 365 has become the most widely-used cloud service in the world: Users ...
Damon Tepe

Confessions of a Password Tweaker – Part 2 (Same s#!t123, different password)

  The week before last, I confessed to password tweaking. Recently Troy Hunt released 320 million ...
David Ross

Confessions of a Password Tweaker

  I have a confession to make. For over twenty years, I’ve been using the same password for most ...
David Ross

The Ethics of Vendor Inaction

When Chris Roberts took the controversial action of accessing sensitive flight systems aboard a live United ...
Tram Nguyen

RIP IOCs: How Machine Learning will Revolutionize IT Security – Part II

In my last blog post, I sounded the death knell for indicators of compromise (IOCs) — attributes that implicate an ...
David Ross

RIP IOCs: How Machine Learning will Revolutionize IT Security – Part I

  For over a decade, the security industry has relied on indicators of compromise (IOCs) — attributes that ...
David Ross
Preventing Fraud After a Carrier Breach

Preventing Fraud After a Carrier Breach

The target of the latest breach to hit the news is Verizon, who announced last week that the data from over 14 ...
Jeff Hickman

What You Need to Know about the Australian Privacy Amendment Bill

  Countries around the globe are putting policies in place to strengthen security and protect their ...
Danielle Jackson

The Future of Biometrics and Authentication

As the threat landscape broadens, it’s essential that organizations adopt techniques that bring greater security ...
Tram Nguyen
Ransomware and Preventing the Misuse of Stolen Credentials

Ransomware and Preventing the Misuse of Stolen Credentials

  On the heels of the WannaCry ransomware assault comes PetyaWrap, an evolution ...
Ryan Rowcliffe
Phishing Attacks: Why they still exist and how adaptive authentication can help

Phishing Attacks: Why they still exist and how adaptive authentication can help

Check out this screenshot. Even though this e-mail is recent, I've been getting this same style of e-mail for the ...
Diego Mejia

Pin It on Pinterest