Monthly Archive for: ‘2 years ago’

Exploring the differences between out-of-band and in-band authentication

Exploring the differences between out-of-band and in-band authentication

When researching and analyzing authentication solutions, people look to see how secure the solution is, how easy it is to …

Read More

What sets a security solution apart in 2015…and beyond

What sets a security solution apart in 2015…and beyond

When you purchase a home, every entrance to the house comes with a lock. The first thing almost every new …

Read More

Big Idea 2015 – take THAT North Korea!

Big Idea 2015 – take THAT North Korea!

When I was in high school, one was expected to know two or three key numbers: your locker combination, your …

Read More

Recent enterprise data breaches make case for stronger authentication

Recent enterprise data breaches make case for stronger authentication

In the middle of February of this year, the health insurance giant, Anthem, released a statement saying that their network …

Read More

The evolution of the mobile device – from cell phone to center of our lives

The evolution of the mobile device – from cell phone to center of our lives

Ask the average American what they simply wouldn’t leave the house without, and the answer would probably be pretty similar …

Read More

Authomate executive team discusses current cybersecurity landscape

Authomate executive team discusses current cybersecurity landscape

The cybersecurity landscape is constantly shifting and evolving. Today’s cyber threats are more sophisticated and organized than ever before. With …

Read More

Why security must be strong…but simple

Why security must be strong…but simple

Everyone that has logged into a virtual desktop, website or other online walled garden is familiar with authentication. That process …

Read More