Online identity theft, simply put, is impersonation on an online platform. If someone else pretends to be you -- either…
The AD connector which comes with Akku, allows organizations to use either their on-prem AD or Azure AD as the…
If your organization relies on the cloud for a majority of its operations, you may want to look closer at…
In recent times, you might have noticed user accounts being compromised by the millions, and yet companies refute these claims…
“irgvctxmsr” - sounds like gibberish, doesn’t it? But if you were to decrypt this string using a mono-alphabet shift cipher…
Ever heard of the butterfly theory? A single flap of a butterfly’s wings in Australia has the potential to cause…
Today’s MNCs were once small or medium businesses (SMBs). Small and medium businesses are the proving ground for emerging technology,…
If a company works with very few applications, user repositories would have to be mapped individually for each application. Every…
Is the only thing standing between your business’ critical data and a cyber attack a set of usernames and passwords?…
Adaptive authentication, method for enforcing the right authentication factors depending on users profile and tendencies. It acts to balance the…