Authentication
Passwordless Authentication
Cost Reduction
Single-Sign-On
Passwords

The Real Cost of Passwords : Why 2FA and SSO don't help

Passwords are expensive for companies. And no, it's not just about the costs that can be incurred if these passwords are stolen or misused. It's also about the fact that passwords cost money in themselves, even though this may not be obvious at first glance. In this article, we look at the true cost of passwords and explain why it is not enough to simply make passwords "more secure".

Read Full Article
Information Security
Passwordless Authentication
Passwords
Authentication Security

Kill the password before it kills you : A Tale on Password Security

As long as there are passwords users, employees and partners will get hacked. The password remains the single biggest threat and alongside with it the attacks that make it so dangerous such as phishing.

Read Full Article
Information Security
Zero Trust
Zero Trust Architecture

What is Zero Trust Architecture? And why there's still lots to be done

Zero Trust Architecture (ZTA) is a concept that has been around for quite a while now. However with recent events such as the global pandemic and thus a rise in work-from-home policies and eroding perimeters, the topic has regained importance more than ever. In this article we'll digest the latest Zero Trust Architecture release by NIST, help you understand it's tenets and introduce it's inherent weaknesses.

Read Full Article
Information Security
Data Breaches
Phishing Attacks

Why Twitter Got Hacked and How to prevent it

In one of the most brazen cyberattacks in recent history, some of the most influential Twitter accounts were compromised in mid-July. Twitter handles that got hacked included powerful names like Elon Musk, Bill Gates, Kanye West, Joe Biden, and even the former United States President Barack Obama. How could this happen? And how can attacks such as these be prevented?

Read Full Article
Information Security
Passwords
Password Security
Best Practices

You should not ask your users to change passwords after a breach. Here's why

Some organisations do it as precautionary measure, others because the login credentials were not secured properly. But: With gazillions of credentials out in the wild, available anywhere, and users continuing with simple permutations, changing the password doesn't solve the problem.

Read Full Article
Authentication
Multi-Factor Authentication
Authentication Security

MFA vs. 2FA : What's the difference?

When trying find the best authentication solution the terminology in the landscape can often be confusing, especially when it comes to two factor vs Multi Factor authentication. In this article we will go through a detailed comparison of the two to help you be informed.

Read Full Article
The Blog.

Stories and Articles on Digital Identity. Information Security. Authentication. Privacy. Compliance. Blockchain. User Experience. Business Development.