NSA on Authentication Hacks (Related to SolarWinds Breach)

The NSA has published an advisory outlining how “malicious cyber actors” are “are manipulating trust in federated authentication environments to access protected data in the cloud.” This is related to the SolarWinds ...
identity verification

Identity Verification: Protecting Customer Data Across Borders

A single platform for international identity verification can help businesses onboard customers from across the globe, verify them in seconds and ensure compliance Today’s digital world creates opportunities for businesses to expand ...
Security Boulevard

How the SolarWinds Hackers Bypassed Duo’s Multi-Factor Authentication

This is interesting: Toward the end of the second incident that Volexity worked involving Dark Halo, the actor was observed accessing the e-mail account of a user via OWA. This was unexpected ...

Are superior macOS authentication capabilities on your holiday wish list?

In speaking with prospects about their identity management wish lists, we were surprised to hear that better authentication protection and ease-of-use for macOS were at the top of their lists. Learn about ...
security

Unifying Security and Applications Through Identity

Identity and security must be built into the overall enterprise IT ecosystem, not simply added on As enterprise perimeters disappear into borderless cyberspace, CISOs are struggling to protect their businesses, partners and ...
Security Boulevard

The Three Branches of Identity Governance

In addition to COVID, 2020 has also happened to be an election year. With US elections mostly completed and the US government in transition – whatever the outcome – certainly consideration of ...

4 Tips for End-to-end Passwordless Authentication for Hybrid Deployments

Most applications are still protected only by passwords that are prone to man-in-the-middle and phishing attacks, increased operational costs, and user frustration. Today, organizations are looking to implement security practices that eliminate ...

12 Essential Tips for Keeping Your Email Safe

Hey, did you get that sketchy email? You know, the one from that malicious hacker trying to fool us into clicking on some malware? Boy, these criminals are relentless. Wait, what? You ...
MFABlog1_8Dec.png

The evolution of MFA authentication technology and what needs to change next

Authentication attacks are big business, and no one is immune from them. In fact, two men were recently arrested and charged in the Twitter employee account compromise that happened in July 2020 ...
Verifying that you're not a robot

Don’t reward your loyal customers by treating them like criminals!

Imagine shopping in your favourite wine merchant or checking in to the brand of hotel that you afford the most loyalty, and at the point of self-identification (either to prove age or ...