Identity Hub

Identity Hub

Dive into a pool of passwordless lexicon. Explore topics on biometrics and identity experiences to discover what it all means.

Biometric Authentication
Identity Hub
Biometric Authentication

Biometric Authentication The growth of facial and fingerprint recognition to authenticate to smartphones and other devices has brought biometric authentication into the mainstream. This form...

Password Alternatives
Identity Hub
Password Alternatives

The fact that you are searching for ‘password alternatives’ tells me you’re an optimist, believing there must be freedom from the pain of passwords. You’ll...

What Is 2FA vs. MFA, SCA and Step Ups?
Identity Hub
What Is 2FA vs. MFA, SCA and Step Ups?

Two-factor authentication has invaded nearly every corner of our digital lives — a gradual but relentless escalation over the years. Most consumers are now very...

PSD2 & SCA
Identity Hub
A Guide To PSD2 & SCA and How It Will Affect Your Business

If you’re in charge of compliance or mitigating potential fraud in your organization, you need to be up-to-date with what’s been happening over in the...

Time-Based One-Time Passwords (TOTP)
Identity Hub
Time-Based One-Time Passwords: The Good, the Bad and the Ugly

One-time passwords (OTPs) are a common method of implementing a “something you have” factor for multi-factor authentication (MFA).  These single-use codes can be implemented in...

FIDO2 What’s the Difference Between CTAP and WebAuthN
Identity Hub
Introduction to FIDO2, CTAP, and WebAuthn

Password-based authentication is the most common form of user authentication; however, it is notoriously insecure. Passwords are commonly weak, reused, or exposed in data breaches.Other...

Authentication Technologies
Identity Hub
5 Authentication Technologies to Know and Implement

Five or six years ago authentication was mostly passwords. Fast forward to today and we’re seeing more authentication options and technologies across the board. The...

1 2 3