Multi-Factor Authentication

Your end users already carry multiple devices. Why not put them to use? That’s the thought behind multi-factor authentication (MFA), a solution leveraging multiple devices and factors to provide extra security: texting an authentication code to a user’s smartphone, for instance. Here’s what Okta has to say about this innovative authentication method.

How Thoughtworks Gained Better Security and Increased Productivity—by Losing Their Dependence on AD

Thoughtworks began its journey away from Active Directory (AD) less than three years ago, though Philip Ibarrola, Thoughtworks TechOps Head of Technology, says it was a long time coming. Thoughtworks was once a Microsoft-only shop: Microsoft servers, Windows-based laptops, and security and authentications, all managed by AD. But since 2011, the…

3 Data Breach Myths Debunked

As the ever-shifting security and threat landscape continues to evolve, it can be tough to distinguish security fact from fiction. Some common data breach misconceptions can seriously misinform your organization’s security strategy. In this post, we’ll touch on three of the most common data breach myths, and share some information on why they don…

How to Boost User Retention with Risk-Based Authentication

Today consumer-facing service providers have a stark choice—to offer robust security or an easy user experience. But for many organizations, missing the mark on either of these elements can seriously damage their user engagement and retention rates—and by extension, their bottom line. To address this, we have now made Risk-Based Authentication…

Microservices vs. SOA—What’s the Difference?

There are a number of things that help make an application what it is—the most fundamental of which is the architecture it’s based on. To date, most technology has been built on monolithic architecture, with all components existing within one complex application. More recently, however, developers have started compartmentalizing each component or…

Don’t Get Pwned: Stop Identity Hacks With Multi-Factor Authentication

“Have I been pwned?” It’s a question you’ve probably asked yourself before. Phishing and stolen credentials are still among the primary threat methods in breaches, and as hackers grow more sophisticated, employees and consumers have to get smarter about the credentials they use to access digital applications. On the flip side, companies also have…

Defending Against Identity Attacks Today and Tomorrow

Anyone who’s ever had their account hacked knows firsthand just how vulnerable our digital identities can be. But having our identities jeopardized doesn’t have to be our fate. Instead, users can take a future-proof approach to protecting themselves from the onslaught of costly identity attacks—both in their personal and professional environments…

How Australia’s Largest University Rolled out MFA to 100,000 Users in 100 Days

Rolling out Multi-factor Authentication (MFA) to over 100,000 users at Australia’s largest university might seem like an impossible task, but Andrew Collins and Cameron Duck of Monash University rolled out this functionality across students, faculty and alumni—all in just 100 days. In the wake of the Silent Librarian phishing attack—which targeted…

Embracing the Kanyes of Our Organization

Let’s talk about Kanye. You might remember that he was featured on international news when he entered his phone password on live TV. But the part that earned him national mockery was the password itself: 000000. It’s easy to laugh at the example he set, but, unfortunately, his attitude towards security is similar to many people today. And when…

Archive