Over the last few decades, compromised usernames and passwords have typically been at the root of some of the most sensational, damaging, and costly data breaches. An incessant drumbeat of advice about how to choose and use strong passwords and how not to fall prey to social engineering attacks has done little to keep threat actors at bay. 


More

The New Stack: 3 Steps to Make Logins with Passkeys Reliable

Passkeys offer modern and secure authentication by enabling cryptography-backed user authentication with a frictionless user…

Read More →

TeleMedia Online: Should All Mobile Business Apps Scrap Passwords and Integrate Biometrics?

Now that all the most advanced mobile devices on the market offer biometric authentication, it’s…

Read More →

Security Magazine: Cyber Insights 2024: A Dire Year for CISOs?

“CISOs are too often overlooked or low on resources, funding and/or business support to properly…

Read More →