News

A future beyond passwords: Key identity management techniques to watch out for in 2024, including passkeys, biometrics and zero trust.
Multi-factor authentication is able to block 99.9% of cyber attacks. We explore how MFA works, its benefits, and why its necessary in 2025.
Voice authentication seemed convenient—until AI made it a security disaster. What was already a flawed security method has become dangerously unreliable, and most people don't realize how ...
Previous methods of identity verification, like pinging credit bureaus, knowledge-based authentication, and even SMS-based two-factor authentication are no longer viable, reliable or secure means ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s ...
Let's get to know two-factor authentication a little better, the different options out there, and dispel some myths surrounding that "annoying" extra step. Most Common Alternatives For Using 2FA ...
No-Password Login Methods Password alternatives typically reside in one or a combination of five passwordless authentication methods.
Microsoft this week announced a preview of 'Authentication Strength,' a new control for organizations using the Azure Active Directory Conditional Access service.