Author: Bhaskar RV

Understanding Offensive Security

Approximately two billion records were stolen between July and October 2019. That’s just in one quarter of a year! This…

6 years ago

How Technology Can Simplify IT Security

Just last year, the popular Q&A site Quora suffered a data breach, as reported by Techworld in their article on…

6 years ago

What is ADFS and why do you need it?

ADFS (Active Directory Federation Services) is an SSO solution created by Microsoft to authenticate users logging into applications which are…

7 years ago

Data Protection & Data Privacy – A difference that matters

Data protection and data privacy are so closely linked that people (and sometimes even organizations) tend to think of them…

7 years ago

The Problem with SMS-based Authentication

As mobile phones became more sophisticated, their usage shifted from being communication oriented to application oriented. But phone numbers were…

7 years ago

Cloud Multi-factor Authentication is the Future of Network Security

Is the only thing standing between your business’ critical data and a cyber attack a set of usernames and passwords?…

7 years ago

Adaptive Authentication for more efficient MFA security

Adaptive authentication, method for enforcing the right authentication factors depending on users profile and tendencies. It acts to balance the…

7 years ago

IAM using SSO and Federated Identity Management

Identity management encompasses several operational mechanisms for managing users across a large system or network of applications. Two of the…

7 years ago

Password Security Threats

Most people use a Password Manager to save their account passwords. A password manager is an app or device which…

7 years ago

Everything You Need to Know About Secure Passwords

Your password - your secret passphrase or PIN that you use for your email, social media profile, or applications at…

7 years ago