Security Risks: How ‘Similar-Solution’ Information Sharing Reduces Risk at the Network Perimeter

Security Risks: How ‘Similar-Solution’ Information Sharing Reduces Risk at the Network Perimeter

We live in a connected world where we have access to several tools to assist in finding any information we need. If we choose to do something risky, there is often some type of notification that warns us of the risk. The same holds true in IT departments. When a ... Read More
Access to Applications Based on a « Driving License » Model

Access to Applications Based on a « Driving License » Model

More and more countries are modifying their policies with a new “driving license” model. With a classic license model, drivers can be caught frequently; they just have to pay a huge amount of money to the police each time. Since this model has lot of limitations, it was changed to ... Read More
Security Impacting Humans: Fingerprinting vs. CAPTCHA

Security Impacting Humans: Fingerprinting vs. CAPTCHA

As all applications need to be both secured and fast, the industry moves towards mitigating bad bots. As nearly 25% of all web traffic is generated by bad bots, we have to be sure we can detect and block them. Of course, this ratio depends on your market – for ... Read More