2017 DBIR: Misuse of Stolen Credentials Unchecked, Out of Control

Verizon’s Data Breach Investigations Report outlines  the percentage of hacking related breaches has increased
Author: 
Stephen Cox, Chief Security Architect

 

Verizon’s Data Breach Investigations Report (DBIR) has once again hit the streets with much fanfare. The 2017 report is Verizon’s tenth DBIR and details findings from over 42,000 security incidents analyzed by the company in 2016. As expected, the report is packed with information absolutely critical to the success of information security industry. 

SecureAuth Wins Stevie in 2017 American Business Awards for Customer Service Department of the Year

Author: 
SecureAuth

 

SecureAuth Wins Stevie in 2017 American Business Awards for Customer Service Department of the Year

The GDPR – and What CISOs Need to Know

General Data Protection Regulations (GDPR) compliance preparation
Author: 
Danielle Jackson

 

The GDPR – and What CISOs Need to Know

With the European Union’s approval of the General Data Protection Regulations (GDPR), organisations will have to change the way they store, transfer and protect their data. The legislation, which is now in effect, will require organisations to become compliant by May 2018.

What is Multi-Factor Authentication?

What is Multi-Factor Authentication? SecureAuth explains what MFA is and the benefits of authentication.
Author: 
SecureAuth

 

Our last blog highlighted two-factor authentication (2FA) and some very real drawbacks in terms of both the user experience and best-in-class security. Multi-factor authentication (MFA), as the name implies, includes 2FA but isn’t limited to just two factors. So, can we increase security by adding more factors to the authentication process?

What is Two-Factor Authentication?

What is two factor authentication, a multi part series from SecureAuth
Author: 
SecureAuth

 

Two-factor authentication (2FA) has been around for a long time, at least in sci-fi. Remember this exchange from 1969?

Captain Kirk: Computer, this is Captain James Kirk of the USS Enterprise. Destruct sequence 1: code 1-1A.

Computer voice: Voice and code 1-1A verified and correct. Sequence 1 complete.

Meet the IAM Disruptors: Robert Block

Author: 
SecureAuth

 

Meet the IAM Disruptors: Robert Block

Today, we announced the latest addition to SecureAuth’s executive leadership team: Robert Block! Robert has joined SecureAuth as the senior vice president of identity strategy, bringing 19 years of results-oriented information technology experience.

Many Tools to Control Access? Consolidate and Become More Efficient

Author: 
Sean Dyon, Solutions Engineer

 

Organizational requirements over the past 15 years started out with simple requirements, namely single sign on goals, better user experience and ease of access. Some started with password vault solutions however many where agent based solutions that front ended internal web servers. As the number of applications grew, so too did the complexity. Often no “one shoe fits all” options where available, so additional software performing the same or similar tasks were needed. Attempts to connect these solutions together further added to the complexity.

Top 5 Reasons to Choose Adaptive SSO

Author: 
Mike Desai

 

Most organizations today recognize the benefits of single sign-on (SSO). Users love SSO because they have only one user ID and password to remember; security teams love SSO because they can require that one password to be a strong one that is regularly changed; and the bean-counters love SSO because it boosts productivity and slashes helpdesk costs by reducing password reset calls.

But the specific type of SSO you choose makes all the difference — to security, to the user experience, and more. Here are the top 5 reasons to choose adaptive SSO:

Pages