Is Authentication Without a Password Secure?

Usernames and passwords have long been the standard when it comes to authentication, but it’s become very clear that this approach to security is fundamentally broken. The good news? Modern authentication technologies are making it possible to secure access in new ways and finally leave passwords behind. MFA leads the way The secret to doing away…

A Brief History of Zero Trust Security

The Forrester Zero Trust model, which has been around since 2009, argues that organisations should regard all network traffic as untrusted, regardless of where it’s coming from. The idea of a trusted internal perimeter leaves the organisation at risk if that perimeter is compromised or an insider turns malicious. Of course, the situation has…

Hacking Achievement, Unlocked

HackerOne was started by hackers and security leaders who are driven by a passion to make the Internet safer. They partner with the global hacker community to surface the most relevant security issues before they can be exploited by criminals. HackerOne hosts live-hacking events around the world throughout the year. One of the largest of these, h1…

How Okta Helps You Comply with PCI-DSS 3.2

As organisations continue to move critical services into the cloud, having strong, centralised identity becomes the foundation of a holistic security strategy. Continuing our efforts to support customers who use Okta to protect Cardholder Data Environments, we are pleased to announce that Okta has released a PCI-DSS Attestation of Compliance (AOC)…

3 Quick Ways to Increase Customer Data Security

Trust is the cornerstone of any successful customer relationship and organisations now have more opportunities than ever to gain that trust. In today’s interconnected world, companies are constantly handling sensitive customer data—and how they use and secure that data plays a huge role in determining the trust customers place in them. A breach…

What is ADFS?

Active Directory Federation Services (ADFS) is a Single Sign-On (SSO) solution created by Microsoft. As a component of Windows Server operating systems, it provides users with authenticated access to applications that are not capable of using Integrated Windows Authentication (IWA) through Active Directory (AD). Developed to provide flexibility,…

Let’s (Finally) Say Goodbye to Passwords

Finding the right authentication technology can be challenging. Companies strive for a solution that achieves the lowest risk of unauthorised access to their businesses' data, be that in the form of sensitive GDPR- and HIPAA-protected information or highly-confidential collateral stored in globally-distributed databases, without encumbering the…

Understanding MFA Factors: You’re Not Using the Right Ones

With the rise in both the number and sophistication of today’s security threats, the benefits of multi-factor authentication (MFA) have become widely recognized, leading to increased adoption across enterprise and consumer apps . From a security standpoint, this is all good news. We know that passwords alone are not enough to secure your data, and…

Biometrics for Authentication: The Risks and Potential Rewards

In the last ten years, biometric technology has morphed from something Hollywood villains use to secure their secret dungeons to something almost everyone has in their pocket. But while adoption of biometric security has seen explosive success, misconceptions about biometric authentication are still very common. Let's take a look at how secure…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube