Author: Alex Brown
A self-professed technology geek, content writer Alex Brown is the kind of person who actually reads the manual that comes with his smartphone from cover to cover. His experience evangelizing for the latest and greatest tech solutions gives him an energized perspective on the latest trends in the authentication industry. Alex most recently led the content team at Boston-based tech company Form.com.
FIDO standards: Trust but Verify… then Verify Again

A little over 5 years ago the first round of FIDO standards were issued with the goal of getting to a future without the need for centrally-stored passwords. While progress has been made, passwords are still around. Below we’ll discuss what FIDO is and the benefits of including it in your security identity. What is […]
The Business Case for Transmit Security

Over the past two decades, new identity-related capabilities have been integrated directly into the applications they served. The application code decides when various capabilities are called and how they are used. Any changes or updates to the identity capabilities require code changes in the applications. Any changes or additions to the user journeys in each […]
iOS 13 Touch Bug Options: Be Agile or Wait

It was recently discovered that older iPhones using Touch ID were affected by a bug in the newly released iOS 13. The bug causes the authentication dialog box to not be displayed, although the Touch ID capability may still be there. Users see no indication that Touch ID authentication was invoked and are not aware […]
New iPhone 11’s Shipped With A Known Vulnerability – I Hope You’re Not Surprised

Earlier this month, a security researcher discovered a vulnerability in the new IOS 13 operating system. Unfortunately, new iPhone 11s were already loaded and packaged with IOS 13 prior to shipment. Users will receive their new iPhones with a vulnerability that could allow access to stored contact information. Fortunately, the vulnerability isn’t very serious, requiring […]
Here We Go Again! Hitachi to Launch Finger Vein Biometrics

Hitachi recently announced their upcoming launch of finger vein biometrics that essentially scans finger vein patterns to authenticate users. Hitachi says the technology will work with any 720p camera (or better) on laptops and mobile devices. The user simply waves their hand in front of the camera when prompted to authenticate to the computer. Hitachi […]
Buyer Beware: Passwordless Doesn’t Always Mean “No-Passwords”

Many vendors hype the elimination of passwords only for you to discover in the fine print that they are simply masking user credentials stored on the phone or pointing to them in a central repository. This type of “password masking” is generally built to provide user convenience rather than stronger security. For example, on an […]
Your employees’ private Google account put you at risk

I’ve mentioned the importance of identifying the weakest links in your security architecture. Every security architecture has a weakness that must be identified and addressed before you end up with a massive security breach that is hard to explain. Huge and respectable enterprises with solid security organizations have experienced embarrassing breaches originating from their weakest links. […]
5 Easy Ways Hackers Can Obtain Your Personal Information

Santander U.K. recently warned that celebrities were setting a bad example on social sites by oversharing personal information, including pet names and dates of birth. This is the exact information that cybercriminals use to break into legitimate user accounts and fraudulently open new accounts by impersonating a real person. A few days after Santander’s warning, […]
The Rise of Edge Computing: Is Cloud the New Mainframe?

If you work in Automotive or Manufacturing, Edge computing is naturally a hot topic for you. However, if you work in a global bank, an insurance company or in retail or fashion you might wonder why on earth should I care about Edge/IoT/and Edge processing power? In the near future you will face a countless […]