Please turn on your JavaScript for this page to function normally.
passwordless
Why FIDO and passwordless authentication is the future

In this Help Net Security video, Jason Kent, Director at Open Seas, explains why FIDO and passwordless authentication is the future. He dives deep into the technical reasons …

Microsoft
Moving your Microsoft environment to zero trust

Zero trust is a concept that’s easy to grasp but incredibly difficult to implement. It touches almost every system, component, application, and resource within an enterprise, …

biometrics
Balance reliable online age verification methods with data protection issues

Recently, California passed the California Age-Appropriate Design Code Act (CAADCA), a bill designed to protect children online. Although the bill has presented notable …

2FA 3FA MFA
2FA, 3FA, MFA… What does it all mean?

Simply put, authentication is the act of proving you are who you say you are. To gain access to protected information, systems or locations, the user must prove their identity …

passwordless
Passwordless will overtake other methods to secure employee identities

Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more …

password
Businesses want technologies that allow for passwordless workflows

Bitwarden announced the results of its 2023 Password Decisions Survey, which polled 800 IT decision makers across a wide range of industries, showing that passwordless …

passwordless
The future of MFA is passwordless

Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more …

identity
2FA is over. Long live 3FA!

In the past few months, we’ve seen an unprecedented number of identity theft attacks targeting accounts protected by two-factor authentication (2FA), challenging the …

lock
API authentication failures demonstrate the need for zero trust

The use of application programming interfaces (APIs) has exploded as businesses deploy mobile apps, containers, serverless computing, microservices, and expand their cloud …

zero
Modernizing data security with a zero trust approach to data access

In a world where we can no longer trust anyone, zero trust security has picked up momentum, especially since 2018 when NIST published Implementing a Zero Trust Architecture. …

lock
Overcoming the roadblocks to passwordless authentication

It’s a well-known fact that humans are the weakest link in any security strategy. Verizon’s latest annual data breach report found that over 80% of breaches in the “Basic Web …

Active Directory
Why organizations should control Active Directory permissions

In this Help Net Security video, Matthew Vinton, Strategic Systems Consultant at Quest Software, illustrates the importance of regularly analyzing, controlling and adapting …

Don't miss

Cybersecurity news