With the explosion of Software as a service applications, organizations are juggling a lot –…
It is a well-established fact that credential theft is the most common attack vector cybercriminals…
Looking at the history of passwords, one realizes that they have been around for centuries…
If you’ve been keeping up on the COVID-19 news, you’ve probably heard about a form…
Identity: the key factor when it comes to verifying who you are and what you…
Soft tokens, Mobile push notification and one-time passwords (OTPs) combined with cloud and mobile have…