Latest posts

PODCAST – The effectiveness of location and intent as authentication factors

PODCAST – The effectiveness of location and intent as authentication factors

In previous posts on Access Granted, we’ve discussed the need for multifactor authentication for both consumers and enterprises, and have …

Read More

The need for multi-factor authentication in the enterprise

The need for multi-factor authentication in the enterprise

As cyber attacks continue to threaten networks around the world, organizations are scrambling to ensure that their most sensitive data …

Read More

Attacking the gaps in traditional security

Attacking the gaps in traditional security

Our growing reliance on our connected lifestyle is evolved hand-in-hand with security threats and bad actors. As technologies increase their …

Read More

How hackers attack POS systems, and how to better protect them

How hackers attack POS systems, and how to better protect them

In a previous post on Access Granted, I took a detailed look at the POS systems in place across most …

Read More

A detailed look at POS system security and where they’re vulnerable

A detailed look at POS system security and where they’re vulnerable

Point of sale (POS) technology has been around for many years starting with the cash register in late 1800s and …

Read More

Ease of use and poor cyber hygiene impacting enterprise security

Ease of use and poor cyber hygiene impacting enterprise security

Cyber threats remain one of the largest – and potentially most costly – challenges impacting enterprises today. According to Verizon’s …

Read More

Strong security not enough to battle insider threat

Strong security not enough to battle insider threat

There’s nothing like a good heist or spy flick to get the heart pumping. And many times, that’s the scenario …

Read More

PODCAST: Authomate executive team discusses release of new authentication solution

PODCAST: Authomate executive team discusses release of new authentication solution

The lines between our personal, professional and consumer lives have been blurred immensely by the emergence of today’s advanced mobile …

Read More

The advantages and problems of multifactor authentication

The advantages and problems of multifactor authentication

If you use one of the many cloud-based email services available – such as Gmail – you’ve probably been asked …

Read More

Exploring the differences between out-of-band and in-band authentication

Exploring the differences between out-of-band and in-band authentication

When researching and analyzing authentication solutions, people look to see how secure the solution is, how easy it is to …

Read More

Page 9 of 14« First...«7891011»...Last »