Stay up to date with next-gen authentication.

Balancing UX and Security: No More Tradeoffs

Accessing vital information to complete day-to-day tasks often requires using a password-based system. They are essential in the transactional relationship between a user and a host. Historically, this relationship has been effective from both the user experience and host perspectives; passwords...

The Rise Of Passwordless Authentication

Introduction
As for any other technology, even authentication systems depend on the environment they are implemented in. In most cases, what was considered to be a standard 20 years ago, is no longer used today. And change happens gradually, then suddenly. Let’s take secure...

Understanding Zero-knowledge Proof

We share so much of our personal lives through the apps we use: the content we share on Facebook, the queries we type on Google, the products we buy on Amazon. Privacy-enhancing tools can be tremendously valuable for us. That’s why technologies such as Zero Knowledge Proof...

Security
7 min read

Cyber Attacks 101

Cyber attacks can take different forms, aiming to obtain sensitive information for malicious purposes. Therefore, understanding the dangers associated with cyber attacks is the first step a company can take to mitigate the risks and threats related to the various cyber-attacks. ...

Roundups
3 min read

This Week in Cyber Security - June 22, 2023

Welcome back to our weekly roundup, the battlefield of cybersecurity news. We're here to cover the front lines of the cybersecurity industry for you! After covering some cyber warfare stuff in last week’s roundup, here is what we have today: Google accuses Microsoft of...