identification
Digital Identification: The Cornerstone for Confidence Online
By combining different digital identity technologies, organizations can withstand the deceptive tactics of cybercriminals ...
Zero-Trust in the Cloud is Hard. Here’s How to Do it Right
A zero-trust security framework is quickly becoming a necessity. Here are a few tips to implement it successfully ...
Okta Adds Security Center to Provide Real-Time Threat Visibility
Okta this week made available Security Center, an extension of the Okta Customer Identity Cloud that provides a real-time view of authentication events, potential security incidents and threat response efficacy. Ian Hassard, ...
Protecting the Future of Digital Identities
In recent years, digital identities have gained popularity and have been implemented by many national governments to serve as the basis of our modern digital society. In the near future, we can ...
PayPal Credential Stuffing Attacks Renew Calls for MFA
An internal review confirmed that on December 20, 2022, unauthorized parties could use account holders’ login credentials to access their PayPal accounts. In response to what is being called a credential stuffing ...
Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode
Why your phone number is becoming a popular way to identify you, our advise on how to best protect your privacy at hacker summer camp in Las Vegas (BSides, BlackHat, DEF CON), ...
Authentication, Identity Verification, and Identification: What’s the Difference
People usually consider authentication, id verification, and identification the same thing, but they are entirely different when we see stuff through the lens of information security experts. Learn the fundamental differences between ...
Tracking People via Bluetooth on Their Phones
We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not ...
Age of No-Code Technologies: Identification and Authentication
No code is a process of developing applications through a graphical interface that requires zero coding. All you need to know is your requirements and you are ready to go. Let’s take ...
World Password Day 2023: Why we need a password-less future
If you’ve read part one, you’ll know that there’s a persistent problem with passwords. Despite the continued warnings, data breaches and endless guidance – weak and easily hackable passwords still guard a ...