The protection of sensitive company networks and critical infrastructures is increasingly in focus, also in view of a tense security situation. In many cases, cyber security concepts currently in use are being put to the test.


More

Security Weekly: Where to Start Your Passwordless Journey? – Jackie Comp, Rolf Lindermann – ESW #274

Migrating off passwords and legacy authentication is a journey. Jackie Comp and Rolf Lindermann of…

Read More →

CIO.com: Seven Signs That Your Consumers are Ready for Passwordless Authentication

Customer demand for passwordless authentication has grown exponentially since smartphones first began offering built-in biometric…

Read More →