Back in 2004, Bill Gates said people would rely less and less on passwords, because they just don't meet the challenge. And really, passwords, the world's most common way of authentication, have been becoming obsolete over the past decade or so. Judging from numerous security incidents we can say that passwords aren't doing their job nearly as effectively as they should. In … [Read more...] about 6 Alternative Authentication Methods to Supersede Passwords
authentication
Preventing Errors: The Human Factor in Cyber Security
It seems that no matter how advanced cyber security systems get over time, the human factor always remains the greatest liability. When it comes to cyber attacks, most of the time the breach happened due to an employee's misjudgment, carelessness, or simply lack of knowledge. According to a research conducted by BakerHostetler that observed the causes of major security breaches … [Read more...] about Preventing Errors: The Human Factor in Cyber Security
What is Federated SSO and How is it Different from SSO?
Federated SSO and SSO may look similar to many people. Cannot blame them as users are only able to see the upper crust of the processes. They need to login with their credentials and enjoys different applications or multiple systems without even repeating the login process. Its a snap! But originally, both techniques work differently. So, do you want to know how federated SSO … [Read more...] about What is Federated SSO and How is it Different from SSO?
Two-Factor Authentication: To Build Or To Buy?
For any business dealing in any niche, cost-price, etc are the most discussed and looked after synonyms. And why not? Most often or not, cost either works as the deal maker or the deal breaker when it comes to decision-making. Need I say everybody is trying to optimize this factor as much as possible? But many times, in order to reduce this factor, people end up making wrong … [Read more...] about Two-Factor Authentication: To Build Or To Buy?
5 Multi-factor Authentication Strategies Enterprises Can Use
In 2016 alone, more than 2.2 billion records were exposed in data breaches. Using a password-based authentication with a good hashing scheme like Bcrypt is perfectly fine as long as you can guarantee that your users wont use easy to guess passwords or reuse passwords at many portals. Both of these assumptions turn out to be wrong in a substantial number of cases, however. There … [Read more...] about 5 Multi-factor Authentication Strategies Enterprises Can Use