Author: Madhav Sattanathan

Myths about Multi-factor Authentication

When large organizations like LinkedIn, Twitter and Facebook report password hacks, it throws some light on how vulnerable current systems…

6 years ago

Web Authentication – The Future of Going Passwordless

Best practices and common sense dictate that we use unique, hard-to-guess passwords for each application that we use. However, most…

6 years ago

The Key to Data Security: WebAuthn

What is WebAuthn? WebAuthn (Web Authentication API) is a global standard specification for secure authentication on the Web, formulated in…

6 years ago

7 Ways in Which Akku can Help you Address Security Challenges

While it is natural to feel apprehensive on the cloud, especially if you are new to it, remember that there…

6 years ago

What is Zero Trust Security?

As organizations increasingly place their data and applications across multiple locations on the cloud, zero trust security is rapidly gaining…

6 years ago

Password Managers can be Hacked. Now What?

On average, every person has 7.6 accounts - that’s a lot of user IDs and passwords for an individual! Remembering…

6 years ago

Government Entities and their Move to the Cloud

Governments across the globe rely increasingly on technology today to serve their citizens better. But with the rapid evolution of…

6 years ago

Secure and Efficient Certificate-Based Authentication

Security and privacy of user data are crucial for any organization and is also a major area of risk. So…

6 years ago

How an Identity and Access Management Solution Can Help Your Data Driven Business

Cloud technology has broken several operational barriers to make remote data access easy. It allows you to scale your business…

7 years ago

What is an IAM ?

Identity and Access Management (or IAM) solutions - also known as Identity Management (IdM) solutions - form a critical component…

7 years ago