Skip to main content

Blog Posts: Authentication

Decentralized Identity – Know Your Customer (Kyc) January 2023 by Rajan Barara

It is a well-established fact that credential theft is the most common attack vector cybercriminals…

Grid Cards: Multi-factor authentication without the technica... November 2022 by Rohan Ramesh

We already know the importance of multi-factor authentication (MFA) to secure access to resources for…

Grid Cards – MFA without the technical overhead October 2022 by Rohan Ramesh

This is part four of our MFA blog series for Cybersecurity Awareness Month. You can…

Breaking down a cyberattack based on compromised credentials... October 2022 by Rohan Ramesh

This is part three of our MFA blog post series for Cybersecurity Awareness Month. You…

Types of Multi-Factor Authentication (MFA) October 2022 by Rohan Ramesh

In the first blog post within our Cybersecurity Awareness Month series, we talked about the…

Is Multi-Factor Authentication (MFA) Good Enough? October 2022 by Rohan Ramesh

Cyber Security Awareness Month is here and as such we want to highlight the importance…

Improve security and customer conversion with zero friction ... September 2022 by Rohan Ramesh

With the fight for the attention of digital consumers, it is crucial to provide a…

Key takeaways from Gartner IAM summit 2022 September 2022 by Rohan Ramesh

Last month IT and security professionals gathered in-person at the Gartner Identity & Access Management…

A Zero Trust framework for the new hybrid workforce September 2022 by Rohan Ramesh

In the past two years the working landscape has shifted and changed completely. Some changes…

Zero Trust takes center stage at EIC 2022 June 2022 by Rohan Ramesh

Considering the continued rise in cyberattacks and increasing regulations for data protection and information security,…

  • Sort by

  • Topic