Author: Alex Brown
A self-professed technology geek, content writer Alex Brown is the kind of person who actually reads the manual that comes with his smartphone from cover to cover. His experience evangelizing for the latest and greatest tech solutions gives him an energized perspective on the latest trends in the authentication industry. Alex most recently led the content team at Boston-based tech company Form.com.
What is Portable Identity?

Applications connect today’s world. Customers want to use them because they’re easy to use and give on-demand services. According to research, US consumers used an average of forty-six different apps per month during the first half of 2021. Unfortunately, traditional customer identity and access management (CIAM) tools often fail to connect a person’s legal identity […]
What is QR Code Authentication?

Once widely used in the automobile industry, these two or three-dimensional scannable images of black squares on a white background have now expanded into many other industries. QR codes, also known as Quick Response Codes, store a hundred times more data than a barcode and deliver it more quickly than the Universal Product Codes (UPC) […]
Credential Stuffing

Credential stuffing takes advantage of password reuse to allow an attacker to hijack a user’s online accounts. If someone uses the same password across multiple websites or online accounts, then a breach of user credentials from one of these sites could allow an attacker to access all accounts that use the same credentials. What is […]
Identity Proofing

In the digital era, everyone uses cloud technologies. Employees use them for remote work. Contractors use them to meet contractual obligations. Customers use them for better experiences. All these changes have permanently shifted the perimeter to focus on identity. Malicious actors know that companies struggle with user authentication, changing their tactics to leverage this attack […]
What Is Cloud Identity and Cloud Authentication?

Cloud computing has exploded in recent years. Almost every organization is using cloud computing in some way, and many are planning to expand their cloud usage in the near future. With the growth of the cloud came new models for consuming IT services. Everything is becoming an “as a Service” offering as cloud providers manage […]
Authentication in E-Commerce

In the early 2000s, people hotly debated whether e-commerce would be a viable business model. Over the last twenty years, the debate has become non-debatable, and the COVID pandemic increased the popularity of online shopping. According to analyst McKinsey, the online retail industry experienced two to five times faster growth in 2020 than before the […]
Identity Management in Healthcare

As a highly regulated industry, the healthcare industry needs to have robust Identity and Access Management (IAM) policies, procedures, and practices. At the same time, cybercriminals target healthcare organizations because they manage valuable protected health information (PHI). Identity management in healthcare is fundamental protecting PHI, and single sign-on technologies enable streamlined user authorization workflows. Challenges […]
OpenID Connect (OIDC) vs OAuth2

In some situations, one application may need access to data held by another application. A common example is a list of contacts used to send emails, texts, etc. to a user’s friends and family. One option for sharing this access is providing one application with the user’s credentials for the other. While this makes it […]
How to Extend Your Legacy IDP With Passwordless Authentication

If your company is like most customer-facing businesses, you already have an identity provider (IdP) and an authentication process in place. Because of these incumbent identity assets, it’s easy to assume that integrating with BindID’s passwordless service won’t work for you. Your IdP might even boast a “passwordless” option that’s supposedly quick and easy to […]