When large organizations like LinkedIn, Twitter and Facebook report password hacks, it throws some light on how vulnerable current systems…
Multi-factor authentication (MFA) is one of the most highly recommended security measures in this age of brute-force attacks, data breaches…
As mobile phones became more sophisticated, their usage shifted from being communication oriented to application oriented. But phone numbers were…
Ever heard of the butterfly theory? A single flap of a butterfly’s wings in Australia has the potential to cause…
Is the only thing standing between your business’ critical data and a cyber attack a set of usernames and passwords?…
Adaptive authentication, method for enforcing the right authentication factors depending on users profile and tendencies. It acts to balance the…
Whether or not you know what it is called, you have likely used 2FA at least once in your life…