Monday, June 21, 2021
The Executive Order aims to ensure that the “prevention, detection, assessment, and remediation of cyber incidents is a top priority and essential to national and economic security.” We wanted to offer our perspective, particularly as it relates to Zero Trust authentication.
Thursday, May 14, 2020
Like all the best technology companies, when you learn what they do and the basics of how they do it, you think: “Why hasn’t anyone done this before?”
Thursday, May 7, 2020
The average employee now has 191 passwords. How did we get here?
Friday, May 1, 2020
How could having no password be more secure than having a password? Isn’t that like removing the lock on your door for the sake of convenience? For those familiar with the principles of asymmetric cryptography, the answer to those questions may be obvious, but for the rest of you I have written up…
Tuesday, April 21, 2020
Look, I know this is over, I know you found something better and I honestly can’t say it’s a surprise. The writing has been on the wall (and the sticky notes on your monitor) for a while now.
Tuesday, April 14, 2020
The Origin of Beyond Identity: Why it took 25 years to adapt asymmetric cryptography to address the password problem.