
The State of UK Financial Crime, Fraud, and Money Laundering
The Financial Conduct Authority (FCA) recently ran a survey on UK financial crime to understand the...

It’s Time to Migrate to Windows Logon with Push Notification
In light of constantly evolving cybersecurity risks, businesses must take strong measures to secure...

Privacy Laws: Who Owns Personal Data?
Who owns your data, and what privacy laws govern it? Well, that depends on where you live. If you own it...

Goodbye Passwords. Hello Behavioral & Biometric Authentication
Before there were ‘preppers’ there were the sign holders, who would boldly proclaim, "The End is Near" on...

The final days of user names and passwords
Last week’s announcement that the online password manager LastPass was hacked, made me realize that the...

Could your mobile voicemail system help hackers unlock your online accounts?
In 1993, Peter Steiner submitted a pen-and-ink cartoon to The New Yorker magazine, featuring two dogs at...

Increasing resilience against Heartbleed-alike bugs using Two-Factor Authentication
On Monday April 7th, news broke about the so-called Heartbleed bug. Heartbleed is a flaw in OpenSSL, a...

3 things to consider when implementing an effective authentication solution
Implementing an effective authentication solution can only be achieved by finding a true balance between...