Identity Hub - Identity Security Blog
Identity Hub

Identity Hub

Dive into a pool of passwordless lexicon. Explore topics on biometrics and identity experiences to discover what it all means.

thumbnail
Passwordless Authentication: A Complete Guide [2022]

Passwordless authentication refers to any identity verification method that doesn’t use a password. Examples of passwordless authentication include physical security keys, authenticator...

thumbnail
Authentication vs. Authorization: What’s the Difference?

Authentication? Authorization? It’s all just logging in, right? Not exactly. While both terms are well known yet often used interchangeably, they are separate...

thumbnail
What Is Security Fatigue and How to Curb It

Much like the fatigue being experienced due to COVID-19, your customers are inundated with news about data breaches and how their private data...

thumbnail
What is Identity as a Service (IDaaS)?

What Is Authentication as a Service? Authentication as a Service (AaaS) is a cloud-based solution for user authentication. Online services can easily...

thumbnail
What is an Identity Provider (IdP)?

What is an identity provider? An identity provider (IdP) is a system that creates, manages and stores digital identities. The capabilities and...

thumbnail
Password Fatigue - What is it and How You Can Overcome It

What is password fatigue? The ever-increasing presence of the internet in our daily lives has led to...

thumbnail
What Is CIAM (Customer Identity and Access Management)?

If you’ve spent any amount of time searching for customer-friendly identity management and authentication, it...

thumbnail
Biometric Authentication

Biometric Authentication The growth of facial and fingerprint recognition to authenticate to smartphones and other devices has...

thumbnail
Password Alternatives

The fact that you are searching for ‘password alternatives’ tells me you’re an optimist, believing there must be freedom from...

thumbnail
A Guide To PSD2 & SCA and How It Will Affect Your Business

If you’re in charge of compliance or mitigating potential fraud in your organization, you need to be up-to-date with what’s been happening over...

thumbnail
Time-Based One-Time Passwords: The Good, the Bad and the Ugly

One-time passwords (OTPs) are a common method of implementing a “something you have” factor for multi-factor authentication (MFA).  These single-use codes can be...

thumbnail
Introduction to FIDO2, CTAP, and WebAuthn

Password-based authentication is the most common form of user authentication; however, it is notoriously insecure. Passwords are commonly weak, reused, or exposed in...

1 2 3