Tag: Authentication

“Are you just one weak password away from a devastating security breach?” Data security is intrinsic to software development, though it is often understated till the time it is compromised. Since the advent of computers, we equate data security with passwords. However, with the increase in cyber threats, the emergence of new technologies and meager…

We have been losing the war on cybercrime for some time now. Research firm Forrester reports over a billion accounts stolen in 2016 alone. We are having to wade through more incident data and people cannot keep up. Could machine learning help solve the problem? For over the years Identity and Access Management (IAM) systems…

Overview There has been much discussion around various authentication methods, which range from username-password to leveraging OTPs, hardware tokens or biometrics, to client certificates etc. Each of these methods provide varying level of confidence in the overall authentication process. This makes one wonder which authentication method is best for a particular organization’s needs. The fundamental...