
Stay up to date with next-gen authentication.


Authentication
4 min read
The Rise Of Passwordless Authentication
Introduction
As for any other technology, even authentication systems depend on the environment they are implemented in. In most cases, what was considered to be a standard 20 years ago, is no longer used today. And change happens gradually, then suddenly. Letâs take secure...

Authentication
4 min read
Why Passwordless Authentication Will Be The Standard For Online Security
In some way or form, passwords play a significant role in our lives. Whether accessing critical information such as banking or personal information needed to carry out tasks, passwords are necessary for day-to-day functions. However, you may have noticed that several industries, including big...

Authentication
4 min read
Biometric Authentication: Best Practices for Optimal Security
Introduction to Biometric Authentication
Biometric authentication is a security method that uses an individual's unique biological or behavioral characteristics to verify their identity and allow them to access a device, server, or platform after verification. The technology has rapidly gained...
Digital ID
4 min read
Bring On Digital ID, Now!


Digital ID
4 min read
Delaying digital ID is detrimental to Canadian citizens
The views expressed in the Opinion section of The Western Standard do not necessarily reflect those of the owners and management. Philippe Desmarais for Western Standard Most of the interactions we have today take place in a digital form. We email our co-workers, order groceries online,...

Open Banking
4 min read
What is open banking? Is it the future of financial services?
The concept of open banking has been gaining a lot of attention and popularity in recent years. To put it in a simple way, open banking is a system that allows third parties to access the financial data of a bankâs customers. This is done through application programming...

Security
7 min read
Cyber Attacks 101
Cyber attacks can take different forms, aiming to obtain sensitive information for malicious purposes. Therefore, understanding the dangers associated with cyber attacks is the first step a company can take to mitigate the risks and threats related to the various cyber-attacks. ...

Roundups
3 min read