What’s the difference between authentication and authorization?

In order to protect sensitive data and operations from unwanted access by intruders and malicious actors, developers integrated authentication and authorization features into their applications. Whether you’re running a banking app, a social media website or a blogging platform, these are the two key functionalities that will seal your application against security incidents. While the two terms are often used interchangeably, authentication and authorization represent [...]

By | 2017-09-19T11:34:11+00:00 September 19th, 2017|Blog|

No-password login: The frictionless and secure alternatives to passwords

Providing secure and easy-to-use authentication and login mechanisms should be one of the main goals every online service pursues. Unfortunately, passwords, the traditional method to protect online accounts and keep intruders out, are becoming less reliable and more cumbersome to maintain, both for users as well as service providers. The industry has become in desperate need for a no-password option. Where to go from here? [...]

By | 2017-09-14T12:07:25+00:00 August 22nd, 2017|Blog|

The Case for the Secret Sharing Scheme

The new paradigm of password-free login, based on ‘secret sharing’; an advanced mathematical algorithm to protect data, is the answer for the emerging challenges of authentication and identity protection.

By | 2017-09-14T12:13:22+00:00 August 16th, 2017|Blog|
Load More Posts