Blog

Justin Mingo | Wednesday, January 13, 2021
Last year was certainly a year that will be remembered in the history books. Between COVID-19, protests, and well … just everything else, it would have been easy to miss all the password theft. Here we’ll present the notable methods – some old, and some new – that hackers used to steal passwords…
Dylan Press | Thursday, September 3, 2020
The reasons why your 4-digit PIN code is more secure than your 12-character password.
Patrick McBride | Thursday, August 20, 2020
What does authorization and visibility look like in the new cybersecurity perimeter?
Patrick McBride | Monday, August 17, 2020
How does the new cybersecurity perimeter affect authentication?
Dylan Press | Tuesday, August 11, 2020
81% of security incidents were tied to weak or stolen passwords. Are there better ways to authenticate?
Dylan Press | Thursday, July 30, 2020
We looked at all of the most popular authentication methods to see how they stacked up on security and usability.
Patrick McBride | Friday, July 17, 2020
What is the new cybersecurity perimeter and what brought about the change?