Using Social Networks as an Identity Provider

By |July 25th, 2018|Categories: Articles|Tags: , , |

One of the major innovations in authentication today has come through harnessing our social accounts as identity providers. Utilizing our social applications to confirm our identities has certainly streamlined access to tools and services. Data has shown that nearly all users have at one point encountered a social login option, and about half use them regularly. The question is: what is [...]

The Quantum Meltdown of Encryption

By |July 22nd, 2018|Categories: In the News|

Published at TechCrunch on Jul 22, 2018 by Shlomi Dolev The world stands at the cusp of one of the greatest breakthroughs in information technology. Huge leaps forward in all fields of computer science, from data analysis to machine learning, will result from this breakthrough. But like all of man’s technological achievements, from the combustion engine to nuclear power, harnessing quantum comes with [...]

Windows Hello for Business – Review

By |July 19th, 2018|Categories: Articles|Tags: , , , |

Just a few years ago, biometric logins were the stuff of science fiction and technophiles. Today, the market has produced a slew of tools that have made biometrics available for the common user. Microsoft’s biometric solution, Windows Hello for Business (WHB), is one of the industries most successful platforms designed for enterprise-wide use. Let’s start with the basics: What Does it [...]

Passwordless Authentication Frequently Asked Questions (Part 2)

By |July 18th, 2018|Categories: Articles|Tags: , , |

As more and more people become aware of the vulnerabilities of passwords, there’s an increasing interest in deploying passwordless authentication in the networks and services of organizations and businesses. However, one of the problems that most organizations face is that the software they use has been designed to work with passwords with default. In the past months, we’ve received plenty of [...]

Passwordless Authentication Frequently Asked Questions (Part 1)

By |July 9th, 2018|Categories: Articles|Tags: , , |

Being in the industry of authentication, we get quite a lot of questions on the topic, especially on how to get rid of passwords while maintaining a high level of assurance. To make access to this information a bit easier, we decided to put out a blog series with answers to the most commonly asked questions. Here’s the rundown of ongoing [...]

Cloud IAM and How to Choose Your Solution

By |July 4th, 2018|Categories: Articles|Tags: , , |

The shift to the cloud continues to be one of the biggest trends in Identity and Access Management (IAM). Indeed, industry leaders have long pointed to the strengths of cloud-based options for managing digital identifies, often not available with on-premises options. But for managers seeking to develop a data security strategy for their organizations, trying to navigate through the slew of [...]

How to Improve the Security of Active Directory Authentication

By |June 24th, 2018|Categories: Articles|Tags: , |

For many organizations, Microsoft’s Active Directory is the meat-and-potatoes of their digital infrastructure. One of the greatest advantages of Active Directory is that it gives organizations a platform to manage everything, including authentication, access to digital assets, applications, administrative functions and possibly anything an employee can do a corporate network. Among directory services, AD is one of the easiest to deploy [...]

The Rise of the e-State – A Story About Estonia

By |June 20th, 2018|Categories: Articles|Tags: , |

We are approaching a future where our physical identity and digital identity will merge. Today, our biological traits, behavioral markers, and other characteristics are used to identify us in the digital sphere, affecting more and more aspects of our daily lives. The numbers on this shift in identity authentication are pretty clear. In a recent IBM study surveying citizens from the North American, [...]

Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place.