Industry blog

Posted: 09 Jul 2020
jcarpenter's picture

Identity and Access Management (IAM) is central to keeping business applications, systems, and data secure. The evolution of the cybersecurity landscape means that IAM vendors need to adapt quickly, listen to their customers, and develop authentication systems that protect employees, customers, and other users across the enterprise....

Continue reading >>
Posted: 22 Jun 2020
jcarpenter's picture

Phishing attacks continue to plague us in 2020 as the number one attack vector of choice by threat actors. Phishing attacks have grown more sophisticated and difficult to spot. Read on to see what you can do to protect your organization from this escalating threat.

...

Continue reading >>
Posted: 02 Apr 2020
jcarpenter's picture

Chances are you are deep in the middle of a remote working scenario that is not of your own creation. The current infectious disease outbreak has sent workforces everywhere scrambling. Employees who have never worked remotely suddenly find themselves dispatched to home offices, IT is under incredible stress, and—as of this writing—it’s hard to predict when we will return to normal.

Hang...

Continue reading >>
Posted: 31 Mar 2020
jcarpenter's picture

Largely the province of military and government powers throughout history, cryptography has evolved significantly over time. From its secretive beginnings as a way to keep sensitive written messages safe from enemies, cryptography has morphed into multiple uses for confidentiality and integrity. This method of hidden (from the Greek kryptόs) writing (from the Greek gráphō) has moved from clay...

Continue reading >>
Posted: 25 Mar 2020
jcarpenter's picture

When you hear the word “espionage,” which spy movie comes to mind?

007? Jason Bourne? Mission Impossible? Unfortunately, corporate espionage isn’t just in the movies—it’s a real threat that has become an ever-evolving challenge to companies large and small. No matter the industry, if your company develops any form of new technology or intellectual property of interest to your...

Continue reading >>
Posted: 26 Nov 2019
jcarpenter's picture

Most IT and cybersecurity professionals have at least occasional anxiety about when the next major virus, ransomware or swarm bot will hit. With the bulk of data breaches occurring at the network perimeter—as users get their emails and go online—user authentication software is a primary concern.

The fight against stolen credentials has led to the growing adoption of two-factor...

Continue reading >>
Posted: 23 Oct 2019
jcarpenter's picture

Whether it’s in whitepapers, news stories, sell sheets, or on display at trade shows, industry jargon around authentication is practically inescapable. In today’s threat landscape, there’s certainly justification for keeping these topics front-of-mind and sparking conversation.

But when authentication concepts start to get a little tangled, it can be hard to know if you’re speaking the...

Continue reading >>
Posted: 03 Oct 2019
jcarpenter's picture

Today’s fast-changing digital environment is throwing identity and authentication challenges at us from every direction. Remote workforces, mobile apps, the Internet of Things (IoT) and increasingly complex data theft schemes just keep upping cybersecurity risks in every type of organization.

...

Continue reading >>
Posted: 23 Aug 2019
jcarpenter's picture

Employees enter login credentials and, once authenticated, gain secure access to valuable network resources and applications. However, requiring users to go through the authentication process only once is turning out to be a risk factor in itself. This process leaves organizations vulnerable to risk every time an employee steps away from their desk, clicks a link, shares a password, or...

Continue reading >>
Posted: 14 Aug 2019
jcarpenter's picture

The online hub for the modern workforce is the mobile phone—making reliable, frictionless security critical. Without it, text messages, location data, contacts and any account information stored on the phone is at risk for theft and misuse. Moreover, the broader universe of enterprise applications accessed through the mobile device can be imperiled.

...

Continue reading >>

Pages