Article posted: Mar 17, 2017
By Joakim Thoren, CEO
News this week that Russian intelligence officers working with hackers were the masterminds behind the theft of 500 million Yahoo accounts is yet another cautionary tale for those who are not using two-factor authentication to protect their data.
While the salacious nature of foreign governments infiltrating the data of U.S. citizens is making headlines, home-grown hackers can inflict plenty of damage as well. Foreign or domestic, the hackers are out there. They want data and money and whatever else they can take.
Article posted: Dec 13, 2016
By Joakim Thoren, CEO
Our late fall 2016 global survey of IT and cybersecurity professionals has turned up some interesting trends for 2017, not the least of which is that more and more companies are and will be using multi-factor authentication to secure their data.
Article posted: Oct 12, 2016
By Marcus Hartwig, GM Americas
When the National Institute of Standards and Technology (NIST) declared over the summer that SMS-based, two-factor identification should be put into the scrap heap of history, lots of us in the industry breathed a sigh of relief.
Article posted: Oct 06, 2016
By Joakim Thorén, CEO
A recent NetworkWorld blog raised some relevant points about identity management for enterprises.
In the article, author and ESG Cybersecurity Analyst Jon Oltsik stresses that "strong authentication is a requirement," saying that "all organizations should have a plan in place for totally eliminating user names and passwords."
Article posted: Jun 01, 2016
By Per-Anders Fjärdsäter, CFO
At its 2016 I/O Developer Conference, Google introduced TRUST API, which aims to eliminate passwords on future Android platforms. Google expects to eliminate passwords by mixing in weaker but unique indicators of who you are. These techniques include obvious biometric indicators such as face shape and voice patterns, as well as less obvious ones like how you move, how you type and how you swipe on the screen.
Article posted: Oct 08, 2015
By Paul Foley, Professional Services Director and Co-Founder
In part one of this blog, I highlighted the pitfalls of single-factor authentication, using the example of a company being attacked by a disgruntled employee. In that scenario, unhappy Mallory uses the Windows Recovery Tool to find the network credentials of co-workers with whom she shares a workstation. Her intentions are not good.