Article posted: Mar 01

By Marcus Hartwig, GM Americas

For more than 20 years, cryptographic hash functions like SHA-1 have played a major role in browser security, managing code repositories or even just detecting duplicate files in storage. SHA-1, or Secure Hash Algorithm 1, was designed by the United States National Security Agency and was published by the United States NIST. We applaud the recent collaboration of the CWI Institute in Amsterdam and Google, which now shows its many flaws and security weaknesses.

Continue Reading...

Article posted: Oct 12

By Marcus Hartwig, GM Americas

When the National Institute of Standards and Technology (NIST) declared over the summer that SMS-based, two-factor identification should be put into the scrap heap of history, lots of us in the industry breathed a sigh of relief.

Continue Reading...

Article posted: Dec 18

By Joakim Thorén, CEO

The 10th annual Gartner IAM Summit in Las Vegas focused heavily on the urgency in deploying identity and access management solutions. ZDNet's report on the Summit noted that Gartner called for innovation in the next identity and access management technology revolution, but the story glossed over one of the key issues: widespread deployment of two-factor authentication and IAM.

Continue Reading...