spacer
  • Request Demo
  • Contact
  • +1 (949) 777-6959

SecureAuth Blog

spacer
spacer Read More

The Security Landscape in 2016: For Better or Worse?

December 23, 2015 | By: SecureAuth

The last few years have seen a number of breaches that call into question the traditional password. In no small part due to high profile security compromises like the Ashley Madison and VTech attacks, companies have learned that password-only policies can leave personal information vulnerable. According to our recent Wakefield survey on budgets, passwords and multi-factor authentication, 66% of companies polled have moved beyond a “passwords only” approach.

spacer Read More

Revered Industry Analyst Identifies SecureAuth IdP as The Next Generation of Adaptive Authentication

December 17, 2015 | By: SecureAuth

Last month, SecureAuth announced its partnership with DARPA-endorsed BehavioSec to deliver Adaptive Authentication with the use of behavioral biometrics. Now, SecureAuth is uniquely positioned to inspect authentication attempts, while maintaining a frictionless user experience. Garrett Bekker, an analyst with 451 Research, provides his insights into the new partnership with a report titled, “SecureAuth Bolsters Threat Detection with BehavioSec Partnership.” In the report, Garrett dis...

spacer Read More

The New Frontier of Adaptive Authentication

December 08, 2015 | By: SecureAuth

A few posts ago we mentioned the survey we conducted in collaboration with SC Magazine, where we asked 500 senior IT leaders about their security practices regarding access control. One aspect we talked about were those organizations that are still trusting the password-only method and where CISOs see themselves a few years down the road. While their methodologies and future plans varied, many of those IT leaders are aware their security programs need to evolve into more sophisticated controls -...

spacer Read More

Managing Inside Risk

December 02, 2015 | By: SecureAuth

Imagine a data breach and you’ll likely picture it starting with a faceless hacker, maybe even a state-sponsored crime ring across the ocean. But one of the biggest security threats comes from insiders and it’s finally getting well-deserved attention.

spacer Read More

The Future of the Password

November 18, 2015 | By: SecureAuth

You don’t need a survey to tell you how dismal cyber security is across the business landscape – just look at the breaches making the news. A survey can, however, explore the finer points of our security practices, illuminating which controls businesses are using, which are working and which aren’t, and their plans for the future.

spacer Read More

The Call for Adaptive Authentication in Healthcare IT Security

November 06, 2015 | By: SecureAuth

Let’s just say it: healthcare IT security is in a state of crisis. Breaches are on the rise and growing larger and more serious all the time; costs are rising too, with an average breach cost of $398 per healthcare record, compared to the general record cost of $217. In fact, one estimated cost of healthcare breaches for 2015 is $5.6 billion.

spacer Read More

Stopping Attacks at the Identity Perimeter

October 14, 2015 | By: SecureAuth

With external threat actors getting in to your organization and insider threats increasing organizations need to step things up and move their identity perimeter from the outside of their network to the individuals logging on to it. External threat actors are using compromised credentials to impersonate insiders to breach the perimeter. Organizations need more than identity management to protect the new perimeter, they need secure access control. This infographic will explain how SecureAuth IdP ...

spacer Read More

The Simple Truth

September 30, 2015 | By: Kayla Sigafoos

With compromised credential use on the rise, how can you be sure that the person logging in to your network is who they say they are based on only a username and password? The truth of the matter is, you can’t. In order to determine if the user logging in to your network is an approved individual then you need to confirm their identity.

spacer Read More

How Does Adaptive Authentication Change Based on Risk, and Why Does it Matter to My Organization?

September 23, 2015 | By: Kayla Sigafoos

Every IT department has the same goal: protect data from attackers and unauthorized users but make it available to authorized employees on any device and from anywhere. The Problem: Simple passwords and elementary data protection methods are easily worked around. Multi-Factor Authentication, one-time-passwords, and biometrics can improve security, but may not be as user friendly and convenient as the employee would like.  Adaptive Authentication evaluates each access request and only s...

spacer Read More

Blocking Healthcare Hackers: The Remote Access Revolution

September 08, 2015 | By: SecureAuth

Healthcare IT teams now have more to manage than just the traditional infrastructure of an organization. With the Internet of Things, IT professionals have to worry about more smart devices being brought on to their network which in turn means more risk. Healthcare IT teams in particular have to worry about the adva

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.