How Authentication and Identification Work Together to Build Digital Trust

The dictionary definition of trust, according to Merriam-Webster, is the “assured reliance on the … truth of someone or something.”

Read more

Can Authentication Negatively Impact the User Experience?

Authentication can sometimes feel like a balancing act. On one hand, securing your digital experience is a top priority. Preserving

Read more

Blockchain Transactions, RFID and More: 7 Security Tips to Help Regulate the Cadaver Trade

While sitting in metaphysics class one afternoon, I asked my philosophy professor if Frankenstein’s monster is really a monster if

Read more

What Are Advanced Persistent Threats (APTs), and How Do You Find Them?

As organizations grapple with the explosion of new and novel threats, they are often constrained by both time and resources

Read more

Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

Creating a seamless, secure experience for your legitimate users is a challenge. Most users are good and deserve a frictionless

Read more

Moving to the Hybrid Cloud? Make Sure It’s Secure by Design

Many organizations have such a positive first experience with cloud computing that they quickly want to move to a hybrid

Read more

Design Your IAM Program With Your Users in Mind

Co-authored by Kevin Pratt Identity and access management (IAM) should be a seamless part of employees’ day-to-day activities and your

Read more