From Cloud Authentication

Second factor authentication, multi-factor authentication, 2FA, risk, strong authentication, RBA, Risk Based Authentication

RBA and 2FA: Partners in the Prevention of Crime

Share Button

After more than a decade of high-profile data breaches – in which the sensitive personal data of hundreds of millions of people were exposed to hackers – it’s clear that password-based authentication alone, albeit convenient, is not secure enough.

Read more

Passwordless Authentication

Passwordless Access: The Future of Authentication?

Share Button

Nearly all data breaches start with compromised passwords. Whether it be through sophisticated phishing, brute force attacks, social engineering, or any other kind of credential harvesting, the password is the first, and sometimes only, line of defense against cyberattacks. Read more

DKIM

Leveraging the Power of Email Authentication – Part 2: Using DKIM to Enable DMARC

Share Button

This article is Part 2 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 3: Implementing DKIM

What is DKIM?

Domain Keys Identified Mail (DKIM) is an email authentication mechanism that allows an email receiver Read more