SecureAuth Continues to Raise the Bar on Passwordless Authentication with New Access Control Methods


With new Link-to-Accept™ and YubiKey multi-factor authentication methods, SecureAuth is taking more organizations passwordless with the flexibility they need.

Confessions of a Password Tweaker - Part 2 (Same s#!t123, different password)

Password tweaking doesn't protect your organization from identity access breaches.
David Ross, VP Research - SecureAuth


The week before last, I confessed to password tweaking.

Recently Troy Hunt released 320 million hashed passwords collected from breaches ( so I thought I’d run an experiment on that data based on common password tweaking techniques. I wanted to see if I could find tweaked variations of a given password in Troy’s data set.

Video: Passwordless Authentication in 10 Seconds

SecureAuth passwordless authentication is more secure than single or second-factor authentication and doesn’t get in the way of users trying to do their jobs. Watch Matt go passwordless in less than 10 seconds, then learn SecureAuth is making passwordless possible today: 

Cognitive Dissonance: Americans worry about their online security – while continuing to practice poor password hygiene



It’s 2017, and data breaches are occurring at a record pace. It’s no wonder, then, that Americans are becoming increasingly anxious about their online security. Our recent report with Wakefield Research says Americans are much more likely to be concerned with their online personal information being stolen (69 percent) than their wallet being stolen (31 percent).

SC Magazine Market Focus: Moving from MFA to Passwordless



Our recent survey, conducted in conjunction with SC Magazine, shows that organizations are moving towards a passwordless future. The results show that while 36% of IT decision makers believe they will no longer rely on passwords 5 years from now, concerns remain around the complexities involved with rolling-out across the enterprise, yet they recognize the benefits of a passwordless strategy.

The problem with passwords

Yes, your users are reusing their passwords and user IDs. What can you do to protect your organization?

SecureAuth Identity and Access Management Secures Credentials with Adaptive MultiFactor Authentication
Jeff Hickman


If you’re an IT pro, you’re likely aware of the very real damage that can result from even one user’s credentials being compromised. Once attackers have a foothold in your systems, they can linger for months, steadily increasing their permissions until they find and steal your most valuable data. Many organizations are already working to strengthen their security posture for preventing the misuse of stolen credentials. But one very real risk is typically overlooked:  the social and personal credentials of our end users.

Survey: Wake-Up Call on Users’ Poor Password Habits

Infographic: A recent SecureAuth survey found that a majority of Americans (81%) reuse passwords -- and Millennials are the biggest culprits! This infographic summarizes the results of the survey and shows how Adaptive Authentication can provide better security and usability in the face of poor password security practices.


SC Magazine Market Focus: Moving from MFA to Passwordless

July 2017: SC Magazine’s Market Focus: Another Paradigm Shifts; Multi-Factor (MFA) might soon forgo the password.

In the 2004 action movie National Treasure, Nicolas Cage needs to guess a not-so-complex password and lift a fingerprint in order to break into the National Archives building and steal the Declaration of Independence. Movies often make stealing two-factor authentication so simple, but is it really that easy? And what if the second factor wasn’t a password at all? Could Cage have broken in?

Passwordless is Possible

According to the latest Verizon Data Breach Report, breaches caused by stolen or weak credentials are on the rise – up from 63% in 2015 to 81% in 2016. While there is no denying that we need to remove our dependency on the password as a primary method of authentication, the question remains how do we get there?