verification
Identity Verification: Is Your Potential Employee Who They Say They Are?
Identity verification has taken on a new urgency for cybersecurity and IT teams in the new era of remote work. Confirming a person’s identity has been important since the advent of data ...
Cybersecurity Lessons from the Pandemic: Data – Part 1
The collection and reporting of data relating to the coronavirus pandemic and related medical research and practices are in a shambles. For example, a June 7, 2020 article by Jason Slotkin cites ...
Keeping Systems Safe From Third Parties
Vendors. Supply chain partners. Third parties. Contractors. All are different names for entities that might need access to your corporate networks and systems. But they have one important thing in common: They ...
Zero Trust – The new default for Information Security
When it comes to granting access to confidential data at work who can really be trusted? With a Zero Trust mindset the answer should be no one at all ...
Spam Bots and Fake Accounts: Helping Solve the Security Identity Crisis
Despite how it sounds, in today’s age of fake news and fake accounts, websites that collect more identifiable information about their users are better-positioned to protect identities and even solve the widespread ...

