Secure digital banking with a superior consumer experience

November 2021 by Jenn Markey

Partly out of necessity, partly convenience, digital banking adoption has skyrocketed since early 2020 and much of this shift is…

A passwordless experience isn’t necessarily passwordless

November 2021 by Jenn Markey

Nobody likes passwords. From an IT perspective, passwords are notoriously insecure with compromised credentials accounting for 81% of all data…

Roadmap to secure digital banking and delight customers

October 2021 by Jenn Markey

Digital payment credential use including smart phone mobile payments is skyrocketing. E-commerce continues its sharp upward trajectory with the associated…

Three ideas to simplify your IT now

October 2021 by Jenn Markey

And just like that its October and another Cybersecurity Awareness Month is upon us. Since last year at this time…

Navigating the hybrid/multi-cloud world with identity orchestration

October 2021 by Jenn Markey

Cloud adoption continues to accelerate with the promise of reduced costs, increased operational agility, and better IT and business alignment….

From cybersecurity to cancer, we’ve got this!

September 2021 by Jenn Markey

On the surface, it may seem that cybersecurity and cancer are two unrelated topics. But, just like a CISO facing…

Fighting Digital Banking’s Fraud Problem

September 2021 by Jenn Markey

Either out of necessity or convenience, the adoption of digital banking has skyrocketed since early 2020 and much of this…

Zero Trust for the hybrid workforce

September 2021 by Jenn Markey

With a limited global vaccine supply and emerging variants, it’s clear we’re headed for a new normal vs. a return…

State and Local Government Cybersecurity: where the rubber meets the r...

August 2021 by Jenn Markey

With SolarWinds and nation state attacks grabbing the headlines, as well as several large US federal cyber initiatives including the…

Keeping criminal justice information secure with advanced authenticati...

August 2021 by Jenn Markey

According to the FBI’s 2020 Internet Crime Report, the Internet Crime Complaint Center received 791,790 cybercrime complaints in 2020, with…

A roadmap for secure digital healthcare

July 2021 by Jenn Markey

Healthcare has been undergoing a steady evolution for decades, but for many this was greatly accelerated by the COVID-19 pandemic….

Think you still have 4+ years to comply with CMMC? Think again.

July 2021 by Jenn Markey

First announced in January 2020 with a prolonged rollout through October 2025, many defense contractors may feel they still have…

If you’re taking advantage of Prime Day, be careful you’re not bei...

June 2021 by Jenn Markey

This year’s Amazon Prime Day – well, two-days – is upon us once again. Peak shopping days like these are…

U.S. Cybersecurity Executive Order and Derived PIV Credential Issuance...

June 2021 by Jenn Markey

The U.S. federal government’s Personal Identity Verification (PIV) program, based on FIPS 201-2, requires smart card-based authentication for employees to…

Protecting digital healthcare’s puppies and unicorns

June 2021 by Jenn Markey

Arguably no other sector has felt the impact of COVID-19 more than healthcare. Beyond being on the front lines of…

We’re stronger together

June 2021 by Jenn Markey & Amanda Walt &

Being in cybersecurity in the era of SolarWinds and Colonial Pipeline, we know a thing or two about stressful situations….

Does your mobile device trust you?

June 2021 by Jenn Markey

It’s almost 14 years to the day that Apple launched the first iPhone, changing our daily lives forever. Fast forward…

With Single Factor Authentication You’re One Step Away from Being th...

June 2021 by Jenn Markey

Security is only as strong as your weakest link. And, as the bad actors know, that weak link is often…

What we learned at Gartner IAM Americas 2021

May 2021 by Jenn Markey

Last week IT professionals across the Americas gathered virtually at the Gartner IAM Americas event to learn about IAM (identity…

On World Password Day eat your greens, exercise more, and ditch the pa...

May 2021 by Jenn Markey

Stolen or compromised credentials, notably passwords, remain the single-largest source of data breaches. In a recent Entrust Pulse survey of…

How a trusted passport solution can secure a faster return to “norma...

April 2021 by Jenn Markey

The past year has been tough on the travel, entertainment, and hospitality industries. More than 62 million travel jobs disappeared…

What will a secure vaccine passport rollout look like?

April 2021 by Jenn Markey

Several vaccine passport solutions have begun to roll out in different parts of the world. In Israel, a “green pass”…

Vaccine passports are coming – what can we learn from past passport ...

April 2021 by Jenn Markey

As access to the COVID-19 vaccine continues to expand rapidly, the end of careful quarantining – and a new beginning…

Looking ahead to Gartner IAM Americas

April 2021 by Jenn Markey

With the pandemic still in our rearview mirror, the theme of the annual Gartner IAM Americas Conference being held virtually…

What is CMMC Compliance?

March 2021 by Jenn Markey

What is CMMC and why does it matter? Cybersecurity Maturity Model Certification (CMMC) is a program established by the US…

Gender diversity in cybersecurity, the key to getting ahead of hackers...

March 2021 by Jenn Markey

People will always be the largest attack surface, and with cyber-attacks becoming increasingly more sophisticated, it’s vitally important that professionals…

Modern Identities for the Digital First World

February 2021 by Jenn Markey

Going to the office, shopping at the mall, and travelling all seem like a distant memory. But while many look…

Vaccine passports, national ID’s, secure credentials and considerati...

February 2021 by Jenn Markey

While countries around the globe are still struggling to procure and distribute enough vaccines for their citizens, the next dilemma…

How 3DS Helps Stop Card-Not-Present (CNP) Fraud Before It Happens

February 2021 by Jenn Markey

A card-not-present (CNP) transaction is any transaction where the magnetic strip is not swiped, the EMV chip not inserted, or…

Yes, you can have it all: How to fight financial fraud and delight con...

January 2021 by Jenn Markey

Digital commerce exploded in 2020 … and with it so did the risk of fraud including identity theft, account takeover,…

Protect your organization from a SolarWinds-type attack

December 2020 by Jenn Markey & Iain Beveridge &

As the impact of the recent SolarWinds cyberattack continues to emerge, the method of attack is becoming clearer: According to…

Top Three Security Challenges With Rapid Digital Transformation in Hea...

December 2020 by Jenn Markey

The pandemic has redefined healthcare delivery, accelerating digital transformation initiatives from years to months and, in some cases, even weeks….

Microsoft outage highlights true cost of free authentication

September 2020 by Jenn Markey

This past Monday, some Microsoft services including Outlook email services, O365, and Teams collaboration suite experienced a prolonged outage, lasting…

Introducing Entrust Identity

September 2020 by Jenn Markey

Today, delivering trust in our increasingly digital lives is becoming more difficult than ever. That is why, as we simplify…

Go passwordless with single sign-on for a digitally enabled remote wor...

September 2020 by Jenn Markey

While people are always your largest attack surface, 2020’s work-from-home (WFH) workforce has magnified this threat exponentially. Remote employees are…

Healthcare IT Under Siege

August 2020 by Jenn Markey

Healthcare is on the front line of the pandemic battle. Not only are healthcare professionals fighting to help patients, they…

Cloud-Based Identities for the New Era of Work

July 2020 by Jenn Markey

In the first half of 2020, organizations around the globe scrambled to get their employees working from home, while also…

Going Passwordless & Touchless: The Argument Grows Stronger

June 2020 by Jenn Markey

Passwords were already losing fans before the pandemic. But as the coronavirus shut down offices, banks, stores and government service…

Verify customer identities quickly and securely

May 2020 by Jenn Markey

Working remotely and digitally has become the new normal for more people than ever before. One of the biggest changes…

On World Password Day, Survey Reveals Remote Workers’ Poor Password ...

May 2020 by Jenn Markey

The global response to the COVID-19 pandemic has accelerated several trends. More employees than ever are working from home. New…

Create a Secure Work From Home Strategy

March 2020 by Jenn Markey

With the coronavirus spreading and business continuity top of mind, we recognize that many companies are actively encouraging their workforce…

Not all passwordless solutions are created equal: what you need to kno...

February 2020 by Jenn Markey

You’ve seen the stats, and one thing is clear: passwords have to go. 80% of hacking-related breaches that “leverage stolen…

  • Sort by

  • Topic

More Blog Topics