The State of Cybersecurity Survey

Cybersecurity Adaptive Authentication
Damon Tepe

The State of Cybersecurity Survey

Ever notice something about surveys? While there are plenty out there about the threats rising on the IT landscape, there isn't always useful information about the controls and techniques leaders are using to stop them. And that's what we really want to know, right? Finding out where other organizations are struggling and where they're succeeding, and how they're approaching attacks, can provide a roadmap to strengthening your own security program.

IDC Link: The Era of the Password Has Passed

The need to strengthen enterprise authentication is almost universally acknowledged. Security professionals are quick to look at two-factor and multi-factor solutions to accomplish the goal; clearly, the addition of second and third factors addresses the need. However, there is a failure in the process to consider the value of the first factor in such solutions, the value of the password. In this Link, IDC examines the value of the password and its limited value in the future of enterprise network security.

Passwordless Authentication: Making the Dream a Reality

Keith Graham

Have you ever tried to get some critical work done, only to be challenged by the system to change your password? Have you ever been locked out because you can’t remember which of your passwords goes with which application? Have you ever succumbed to the temptation to write your passwords down, security policies be damned? And has ‘forgot my password’ become part of the login process for less frequently accessed sites and applications?

You’re not alone. There are even new names for what we’re all feeling, ranging from “password fatigue” all the way to “password rage.”

Information Age: Organisations Are Ready to Phase Out Passwords. Are You?

Organisations are ready to phase out passwords. Are you?

What are the main hindrances stopping the adoption of authentication strategies, and will passwords be around for much longer?

Single-factor, password-based authentication – and even many traditional two-factor approaches – are no longer enough to secure today’s increasingly digital world.

Making Passwordless Possible

What do the breaches at Target, LinkedIn, and Home Depot have in common? Compromised passwords.

The Password's Pulse Beats On Infographic


Many companies are ignoring the risk that password only access poses to their business, leaving them exposed to data breaches and fraud. With 39 % of UK businesses only relying on passwords for authentication they are leaving a gaping hole in access control, making it easier attack the network by compromising credentials. With threats at an all time high, organizations must change their access control approach before it is too late. This infographic will show a trend in the market for how reliance on passwords is becoming obsolete.

More Than One in Three Americans Engage in Risky Password Behavior Finds SecureAuth Survey

IRVINE, Calif. – April 20, 2016 – SecureAuth Corporation, the leader in adaptive access control, today announced in conjunction with Wakefield, the results of its survey on how Americans perceive and handle passwords. The report found that Americans are exasperated with conventional online password management, which has led to risky behavior. In fact, more than one in three Americans (35 percent) write passwords down to help remember them.

SecureAuth Survey: Americans Giving Out Addresses, Credit Card Numbers on Public WiFi

IRVINE, Calif. – May 26, 2016 – SecureAuth Corporation, the leader in adaptive access control, today announced in conjunction with Wakefield, the results of its survey about perceptions around internet speed versus personal security and online behavior over public Wi-Fi. The report found that Americans, if given the choice, would rather improve personal online security (57%) over internet speed (43%).