Decentralized Identity – Know Your Customer (Kyc)
It is a well-established fact that credential theft is the most common attack vector cybercriminals…
Securing Your Organization with a Credentials-Based Password...
Looking at the history of passwords, one realizes that they have been around for centuries…
“Zoombombing”: What Is it and How Do You Avoid it?
If you’ve been keeping up on the COVID-19 news, you’ve probably heard about a form…
It All Starts with Identity
Identity: the key factor when it comes to verifying who you are and what you…
Multi-factor authentication is a commodity play. What now?
April 2018 by
Rajan Barara
Soft tokens, Mobile push notification and one-time passwords (OTPs) combined with cloud and mobile have…