Identity and Access Management (IAM) is continuing to attract investment from businesses, with over 80% of global IT decision makers having already adopted or...
The frequency and severity of data breaches are continuing to grow, with the cost of the average breach rising again in 2021 to over £3 million. The previous year,...
Identity and Access Management encompasses a wide range of technologies, policies, and models. With so many different things involved, it can be difficult to keep...
Most businesses have had to adapt to some form of remote working over the past year. Whilst there have certainly been challenges with this transition – especially...
The reuse of passwords is a ubiquitous problem. In many ways, it’s unsurprising that employees so often resort to using the same password more than once, given that...
Zero Trust is a security model which states that actors and systems should not be automatically trusted solely because they exist within a security perimeter and...
Password-based authentication is now well over 60 years old, and its age is beginning to show. The wide range of cloud apps used by employees in modern enterprises...
As employees use more and more cloud apps, they also need to keep track of more and more passwords. Keeping track of so many sets of credentials can often lead to...
Single Sign-On and Passwordless Authentication are crucial technologies for protecting against cyber attacks, especially in cloud systems. Most solutions are...
The password may be an old technology, but it’s still the most common method of authentication used in businesses today. Yet as cyber attacks continue to grow...