by Abbey Freeman 0 Comments

[DIY] Create a Random Password in 5 Easy Steps!

Let’s give it up for those who want to create a difficult to crack (and remember) password but hesitate to use password generators… fearing their “random password” will be intercepted en route to their screen! Your cynicism is truly admirable. For everyone else vaguely worried about that problem but not enough to do anything about it, this easy step-by-step will guide you through the process...

Continue Reading →

Tags: Password, secure passwords, enforcing strong passwords, reduce reusing weak passwords

by Gregg Browinski 0 Comments

How Can a Cloud Provider Securely Access my Active Directory?

More users and companies are running software applications in the cloud than ever before. When even the US Federal government is looking to get into the cloud, it's a clear indication that it has reached wide acceptance. Similarly, Identity as a Service (IDaaS) has been around for years, but how often do admins considering this approach bother to take a deeper dive into the issue of directory...

Continue Reading →

Tags: Authentication, Authentication Methods, Authentication Security, Cloud SaaS, encryption, firewall, Identity Federation, IT Security, #security, Access Control, Access Management, Active Directory, User Authentication, VPN, OAuth 2.0, OAauth, IDaaS, directory synchronization

by Peter 0 Comments

BIO-key is one of the 20 Most Promising Banking Technology Solution Providers

CIOReview has compiled a list of 20 Banking Technology Solution Providers to guide the financial sector in harnessing the power of technology to tackle today’s challenges, reduce workload, and increase efficiencies. The organizations featured in this issue through their business knowledge and industry prowess have established their eminence in the banking solutions sector.

Continue Reading →

Tags: Article, Blog Article - Move to HubSpot, News

by Jay Ouellette 0 Comments

Is ADFS Really Saving You Money?

Active Directory Federated Services (ADFS) from Microsoft is well known for its simplicity and ease of use. Many organizations and schools adopt ADFS for these reasons, only to realize that it does not always play well other applications.

Continue Reading →

Tags: Microsoft, Single Sign-On, Single Sign-On (SSO), Windows 10, Single Sign-On Options, security compliance

by Christopher Perry 0 Comments

Prophecy Vs. Reality: Popular Cybersecurity Trends of 2019

Society loves prophecy.  Whether it’s used as a justification for acts of good or evil, or even if it’s just a matter of looking at your friend and saying “HA!  I was right!”  Correctly predicting what’s coming is a safe bet in terms of drawing interest, and it is a small wonder that even the biggest tech giants have hopped on that bandwagon.  Of course, prophecy and reality often differ, and...

Continue Reading →

Tags: 2FA, Authentication, authentication management, Authentication Security, authentication security, cloud, Cloud SaaS, cloud security, #cybersecurity, encryption, Gartner, Identity Provider, MFA, Multi-Factor Authentication, #passwords, #ssoimplementations, trust, Authentication Provider, Cloud authenticaiton, Cloud Authentication, data breach, data security, password encryption, two-factor, Two-Factor Authentication, #twofactor, security trends, password habits, secure acounts, password-based authentication, passwordless, Keeping your information safe, NIST, contextual Two-Factor Authentication, usual password, Google, identity solutions, open-source software, haveibeenpwned.com, two-step authentication, two-step verification, real-time monitoring