Secret Double Octopus Named “Best in Class” | Read Aite's 2021 Passwordless Report
Aite Group Passwordless Matrix Report 2021

Best of 2020: Our most-read blogs of the year

Best of 2020 in our Blogs

Blog

Tuesday December 29, 2020

Best of 2020: Our most-read blogs of the year

This year has been like no other, but our amazing staff stayed focused on securing your domain amid all the unexpected changes. And while COVID-19 and its effects on the workplace were hot topics in many circles, our readers mainly wanted interesting and useful guides to the world of passwordless. Here are the stars of...
Read more

This year has been like no other, but our amazing staff stayed focused on securing your domain amid all the unexpected changes. And while COVID-19 and its effects on the workplace were hot topics in many circles, our readers mainly wanted interesting and useful guides to the world of passwordless. Here are the stars of 2020 in our blog:

 

 

Federated Identity VS Single Sign-On

Federated Identity VS Single Sign-On

What is federated identity and how does it work? How does it differ from SSO?
What are the risks and benefits involved with these methods of digital access?

 

Software Tokens Vs Hardware Tokens

Software Tokens Vs Hardware Tokens

A look at how tokens fit into the authentication process, and a comparison of the different types of tokens – hard tokens, soft tokens, and everything in between.

 

LDAP, Active Directory and Federated Identity: What You Need to Know

LDAP, Active Directory and Federated Identity: What You Need to Know

A dive into the most common tools used in enterprise authentication today: Lightweight Directory Access Protocol or LDAP, Microsoft’s Active Directory (AD) and how Federated identities are used and managed.

 

Your Complete Guide to FIDO, FIDO2 and WebAuthn

Your Complete Guide to FIDO, FIDO2 and WebAuthn

What is FIDO? What are the different specifications and certifications involved? And how does it all help the passwordless revolution?

 

The Ultimate Guide to Man in the Middle (MITM) Attacks and How to Prevent them

The Ultimate Guide to Man in the Middle (MITM) Attacks and How to Prevent them

A man-in-the-middle (MITM) attack is one of the worst things that can happen to an individual or organization. Read about the different types of MITM attacks to better understand and protect your domain.