Authentication

The Password is Dead?


The password is dead, or at least that was what Bill Gates proclaimed in 2004. Since then, the password has been declared defunct many times by industry leaders and pundits. Death knells for the much maligned, but much used passwords have now reached a frantic level. Despite the strident proclamations of the demise of...

Authentication

IAM First: Your Best Approach to GDPR Readiness


The effort to achieve compliance is significant. The fines for failing can cripple a business. The deadline is getting closer every day. With all those factors in place, preparing for the General Data Privacy Regulation (GDPR) is a top business priority. When...

Biometric Identity

Identifying Biometric Use Cases for Regulatory Compliance


In the first post of this blog series, we explored recent state legislation governing the use of biometrics. Now let’s shift the focus into understanding how your organization is using biometrics and if legislation applies to you. How Does Your Organization...

Authentication

Top Trends Throwing Passwords into a Death Spiral


Over the years, passwords have become less and less reliable when it comes to protecting critical company data. It’s increasingly difficult to manage, memorize and keep passwords safe. Bad actors have numerous ways to crack, steal, reset or bypass them....

Authentication

No Server Left Behind


In late September, The Guardian broke the story of a major data breach at Deloitte, one of the world’s largest accounting & consulting firms. This cyber attack exposed millions of emails coming from and to Deloitte employees. The hack team used login...

Biometric Fundamentals

7 Ways Biometrics Can Protect Consumers and Enhance Security


The world relies more and more on technology to ensure our important data and personal details are protected due to the increasing cohort of bad actors intent on making off with the digital keys to our personal lives and finances. The businesses that manage...