by Christopher Perry 0 Comments

Prophecy Vs. Reality: Popular Cybersecurity Trends of 2019

Society loves prophecy.  Whether it’s used as a justification for acts of good or evil, or even if it’s just a matter of looking at your friend and saying “HA!  I was right!”  Correctly predicting what’s coming is a safe bet in terms of drawing interest, and it is a small wonder that even the biggest tech giants have hopped on that bandwagon.  Of course, prophecy and reality often differ, and...

Continue Reading →

Tags: 2FA, Authentication, authentication management, Authentication Security, authentication security, cloud, Cloud SaaS, cloud security, #cybersecurity, encryption, Gartner, Identity Provider, MFA, Multi-Factor Authentication, #passwords, #ssoimplementations, trust, Authentication Provider, Cloud authenticaiton, Cloud Authentication, data breach, data security, password encryption, two-factor, Two-Factor Authentication, #twofactor, security trends, password habits, secure acounts, password-based authentication, passwordless, Keeping your information safe, NIST, contextual Two-Factor Authentication, usual password, Google, identity solutions, open-source software, haveibeenpwned.com, two-step authentication, two-step verification, real-time monitoring

It took 10 years, but the future has arrived for Multi-Factor Authentication!

The internet is a curious thing. It empowers us by being a gateway to the world's information, increases productivity by enabling us to work anywhere in the world and entertains us by streaming decades' worth of music, movies and television shows with a few clicks. Unfortunately, it also harbors the worst kinds of profit or thrill-seeking miscreants and criminals whether they are working alone...

Continue Reading →

Tags: 2FA, Authentication Security, information security, MFA, Multi-Factor Authentication, network security, #2FA, data breach, #phishing, two-factor, Two-Factor Authentication, #YubiKey, increase security, Google Authenticator, Duo Push Security, secure passwords, FIDO, FIDO Alliance, Biometrics, information systems, voice biometrics, password-based authentication, multilayer encryption, strong online security, technology evolution, improve security, phone call, interoperability, FIDO2, PKI, Public Key Infrastructure, Client-to-Authenticator, CTAP, fingerprint readers, hardware token, passwordless, WebAuthn, Web Authentication, Authenticators