Password

The future of authentication is passwordless, and we know everything about passwordless solutions.

3 Pillars of Digital Transformation: Cost, Usability, and Security

By Shimrit Tzur-David|June 30th, 2020|Categories: Articles|Tags: , , , , , , |

Digital transformation is nothing new. Enterprises have been striving to achieve digital El Dorado for over a decade now, looking to solve usability and security issues and improve the quality of work and service. Yet, the progress has been slow, to say the least. It’s not that companies do not understand the value. It has been widely accepted that digital transformation is THE thing to strive for. After all, digital-first [...]

How to handle passwords under GDPR

By Inbal Voitiz|June 22nd, 2020|Categories: Articles|Tags: , , , , , , |

Two key regulations that have impacted the security and privacy landscape are the European Unions General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Although both legislations are applicable to their own jurisdictions, they have considerable impact on how companies around the globe operate. We live in a globalized online economy, where your business can have customers across the world, and you should be careful not to run afoul of any of these regulatory measures, and others [...]

Put a PIN in that: why passwords vs. PINs comparisons are irrelevant

By Inbal Voitiz|June 9th, 2020|Categories: Articles|Tags: , , , , , , |

Your IT: "Your account is now secured with a PIN, adding an extra layer of security to your account." Your Users: "Great idea! I'll just use my credit card PIN, and now I will always remember my computer PIN too!"  Many security managers have struggled with similar exchanges in recent years, as the business world continuously examines added security layers for  employees and users [...]

Getting back to normal: secure work in a post-coronavirus world 

By Raz Rafaeli|May 25th, 2020|Categories: Articles|Tags: , , , , |

For the second time in a few short months, we are entering uncharted territory. After having to adjust to unprecedented lockdowns and near standstill of economic activity, now businesses worldwide are slowly, and with cautious optimism, getting back to some regular routine.   The truth is, no one knows what the new normal will look like. But one thing is clear - as organizations prepare to resume operations, we have to fundamentally rethink many of our [...]

2FA VS Passwordless Authentication – Equal Enterprise Security?

By Inbal Voitiz|May 12th, 2020|Categories: Articles|Tags: , , , , |

Enterprise security is a fight to the death. It’s rough out there! Passwords are ridiculously easy to guess, and the ones that aren't are almost as easily stolen. Just look at the countless high profile server breaches that leaked millions of end-user passwords over the years. It’s banks and businesses, not just consumers, that end up paying when hackers use stolen credentials to raid bank [...]

Cloud Identity Management Challenges

By Amit Rahav|February 4th, 2020|Categories: Articles|Tags: , , , , |

For years, enterprises have been rapidly adopting cloud technologies for many of their data processing tasks. The area of identity management is no exception. To this day, it is still a particularly fast-growing trend within the cloud revolution. Cloud Identity providers, or IDPs, have been taking the world of IT by storm. According to an estimate from Gartner, cloud-based identity is [...]

Passwordless Authentication is BOOMING

By Inbal Voitiz|January 1st, 2020|Categories: Articles|Tags: , , , , |

We’ve always understood security and usability to have an inverse relationship. Passwords are fundamentally flawed. They offer the worst of both worlds – poor usability and poor security. But what if I told you that by letting go of passwords we can finally make usability and security work together, not against each other?

State Sponsored Identity Breaches

By Shimrit Tzur-David|November 27th, 2019|Categories: Articles|Tags: , , |

Cybersecurity officials in Bulgaria revealed news of a massive hack that hit government databases. According to reports, records of more than five million Bulgarians were stolen by hackers from the country's tax revenue office. In a country with a population of just seven million, the scale of the hack means that basically, every Bulgarian adult has had their personal information compromised. [...]

Bypassing 2FA

By Amit Rahav|November 4th, 2019|Categories: Articles|Tags: , , , |

Two factor authentication is all the rage right now. Consumers and business users alike are encouraged to use 2FA. It is often heralded as the ultimate solution to protect us against the dangers of identity theft and corporate data breaches.   Don’t get me wrong, 2FA is immensely better than a primitive login, but it is still not all that it is made out to be. Here is the deal: passwords are fundamentally unsafe. As long as passwords stay in the mix, defending accounts with additional layers of security (no matter how robust ) is a band-aid solution at best. 

True Cost of Password Based Authentication

By Amit Rahav|October 3rd, 2019|Categories: Articles|Tags: , , , |

Just because you don’t have to pay anything extra to buy this common form of authentication, it doesn’t mean that passwords are free.  Far from it, quite often passwords end up costing enterprises much more than what they have bargained for. Although the cost of passwords rarely comes up in management meetings, authenticating identity using passwords is a significant expense for [...]

The Ultimate Solution For Credential Stuffing Attacks

By Inbal Voitiz|September 19th, 2019|Categories: Articles|Tags: , , |

At the recent Usenix Security Conference, researchers at Google and Stanford revealed new statistics and insights that show the poor state of password security, and how credential stuffing remains an ever-present threat to the current account security landscape.  While the researches provide good information on password insecurity, their guidelines fall short of providing a permanent solution to protect individuals and organizations [...]

On-Premise Plus Cloud = The Hybrid Approach

By Inbal Voitiz|August 26th, 2019|Categories: Articles|Tags: , , , , |

A quick look at the headlines of tech blogs and publications will give the impression that all companies and organizations are transferring their IT infrastructure and digital assets to public cloud services. The transition to the cloud is happening at a gradually accelerating pace. The future of online businesses, small and large, resides in the cloud. It sounds like a fair [...]

14 British Cybersecurity Influencers That You Need to Follow

By Inbal Voitiz|August 8th, 2019|Categories: Articles|Tags: , , |

The UK is known for the XFactor and Brexit, but it also boasts incredibly talented, funny, and entertaining cybersecurity experts. Each of the experts listed below excels in their field, and their online content is enlightening and educational — check them out! Dave Whitelegg (@SecurityExpert) Although Whitelegg has been writing about IT and security since 2007, his cybersecurity journey began in [...]

x

Get in Touch

x

Get in Touch With Sales

x

Leaving Already?

Get our solution overview to learn how we can finally rid your company of passwords!