Identity & Access
NSA on Authentication Hacks (Related to SolarWinds Breach)
The NSA has published an advisory outlining how “malicious cyber actors” are “are manipulating trust in federated authentication environments to access protected data in the cloud.” This is related to the SolarWinds ...
Identity Verification: Protecting Customer Data Across Borders
A single platform for international identity verification can help businesses onboard customers from across the globe, verify them in seconds and ensure compliance Today’s digital world creates opportunities for businesses to expand ...
How the SolarWinds Hackers Bypassed Duo’s Multi-Factor Authentication
This is interesting: Toward the end of the second incident that Volexity worked involving Dark Halo, the actor was observed accessing the e-mail account of a user via OWA. This was unexpected ...
Are superior macOS authentication capabilities on your holiday wish list?
In speaking with prospects about their identity management wish lists, we were surprised to hear that better authentication protection and ease-of-use for macOS were at the top of their lists. Learn about ...
Unifying Security and Applications Through Identity
Identity and security must be built into the overall enterprise IT ecosystem, not simply added on As enterprise perimeters disappear into borderless cyberspace, CISOs are struggling to protect their businesses, partners and ...
The Three Branches of Identity Governance
In addition to COVID, 2020 has also happened to be an election year. With US elections mostly completed and the US government in transition – whatever the outcome – certainly consideration of ...
4 Tips for End-to-end Passwordless Authentication for Hybrid Deployments
Most applications are still protected only by passwords that are prone to man-in-the-middle and phishing attacks, increased operational costs, and user frustration. Today, organizations are looking to implement security practices that eliminate ...
12 Essential Tips for Keeping Your Email Safe
Hey, did you get that sketchy email? You know, the one from that malicious hacker trying to fool us into clicking on some malware? Boy, these criminals are relentless. Wait, what? You ...
The evolution of MFA authentication technology and what needs to change next
Authentication attacks are big business, and no one is immune from them. In fact, two men were recently arrested and charged in the Twitter employee account compromise that happened in July 2020 ...
Don’t reward your loyal customers by treating them like criminals!
Imagine shopping in your favourite wine merchant or checking in to the brand of hotel that you afford the most loyalty, and at the point of self-identification (either to prove age or ...
