authentication

How to prevent corporate credentials ending up on the dark web
A little over $3,000 — that’s how much stolen corporate network credentials tend to go for on the dark web. Although the exact asking price for an individual’s …

Turning the tide on surging account takeovers in the media industry
Account takeovers (ATOs) are on the rise, fueled by the widespread use of automated bots. The media industry, which includes social networks, content streaming, gambling, …

Consumer attitudes towards various digital identity authentication methods
With concerns around online fraud and identity theft rising, consumers expect businesses to utilize new technologies to protect them online. According to research from …

Combating deepfakes: How we can future-proof our biometric identities
How worried should we be about deepfakes? What sort of threat do they pose to digital ID verification and the biometric technology that we are becoming so reliant on, and are …

Most financial services mobile apps still rely on passwords, even with added friction
Incognia announced a report which highlights results from their most recent study focusing on authentication and friction at login and the password reset process. The study …

Identity management and zero trust: Where to get started
The past year has taught us all a few things, from how much we value our health to what we take for granted regarding IT. The impact of the last year should be obvious, but …

Platform or roaming FIDO2 authenticators: Which one is right for your workforce?
One of the main criticisms of any advanced authentication system is usability. In FIDO2 multi-factor authentication (MFA), platform authenticators aim to be the answer to our …

Consumers neglecting mobile security despite growing number of threats
Over the past year, consumers have adapted to many changes, including the rapid shift towards a digital-first lifestyle. This has led to an emphasis on consumers dependence on …

What is plaguing digital identities?
Auth0 launched a report which highlights key areas of concern for security professionals responsible for managing digital identities, including the exponential rise of …

Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era
In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …

How to secure data one firewall at a time
The need for secure data access management is top-of-mind in the C-suite and boardroom. The question I keep hearing from IT departments is how to do it right, that is, how to …

Biometrics for banking and financial services market to reach $8.9 billion by 2026
The turn of next decade is expected to be more challenging for banks and financial institutions as security breaches become more sophisticated with technology advancements. …