Gender diversity in cybersecurity, the key to getting ahead of hackers...

March 2021 by Jenn Markey

People will always be the largest attack surface, and with cyber-attacks becoming increasingly more sophisticated, it’s vitally important that professionals…

Modern Identities for the Digital First World

February 2021 by Jenn Markey

Going to the office, shopping at the mall, and travelling all seem like a distant memory. But while many look…

Vaccine passports, national ID’s, secure credentials and considerati...

February 2021 by Jenn Markey

While countries around the globe are still struggling to procure and distribute enough vaccines for their citizens, the next dilemma…

How 3DS Helps Stop Card-Not-Present (CNP) Fraud Before It Happens

February 2021 by Jenn Markey

A card-not-present (CNP) transaction is any transaction where the magnetic strip is not swiped, the EMV chip not inserted, or…

Yes, you can have it all: How to fight financial fraud and delight con...

January 2021 by Jenn Markey

Digital commerce exploded in 2020 … and with it so did the risk of fraud including identity theft, account takeover,…

Protect your organization from a SolarWinds-type attack

December 2020 by Jenn Markey & Iain Beveridge &

As the impact of the recent SolarWinds cyberattack continues to emerge, the method of attack is becoming clearer: According to…

Top Three Security Challenges With Rapid Digital Transformation in Hea...

December 2020 by Jenn Markey

The pandemic has redefined healthcare delivery, accelerating digital transformation initiatives from years to months and, in some cases, even weeks….

Microsoft outage highlights true cost of free authentication

September 2020 by Jenn Markey

This past Monday, some Microsoft services including Outlook email services, O365, and Teams collaboration suite experienced a prolonged outage, lasting…

Introducing Entrust Identity

September 2020 by Jenn Markey

Today, delivering trust in our increasingly digital lives is becoming more difficult than ever. That is why, as we simplify…

Go passwordless with single sign-on for a digitally enabled remote wor...

September 2020 by Jenn Markey

While people are always your largest attack surface, 2020’s work-from-home (WFH) workforce has magnified this threat exponentially. Remote employees are…

Healthcare IT Under Siege

August 2020 by Jenn Markey

Healthcare is on the front line of the pandemic battle. Not only are healthcare professionals fighting to help patients, they…

Cloud-Based Identities for the New Era of Work

July 2020 by Jenn Markey

In the first half of 2020, organizations around the globe scrambled to get their employees working from home, while also…

Going Passwordless & Touchless: The Argument Grows Stronger

June 2020 by Jenn Markey

Passwords were already losing fans before the pandemic. But as the coronavirus shut down offices, banks, stores and government service…

Verify customer identities quickly and securely

May 2020 by Jenn Markey

Working remotely and digitally has become the new normal for more people than ever before. One of the biggest changes…

On World Password Day, Survey Reveals Remote Workers’ Poor Password ...

May 2020 by Jenn Markey

The global response to the COVID-19 pandemic has accelerated several trends. More employees than ever are working from home. New…

Create a Secure Work From Home Strategy

March 2020 by Jenn Markey

With the coronavirus spreading and business continuity top of mind, we recognize that many companies are actively encouraging their workforce…

Not all passwordless solutions are created equal: what you need to kno...

February 2020 by Jenn Markey

You’ve seen the stats, and one thing is clear: passwords have to go. 80% of hacking-related breaches that “leverage stolen…

  • Sort by

  • Topic

More Blog Topics