Blog
-
Active Directory
Active Directory (AD) is a database and set of services that connect users with the network resources they need to get their work done. The database (or directory) contains critical information about…
December 15, 2022 -
Access Management
Is a broad concept that encompasses the policies, processes, methodologies, and tools that manage user privileges. In access management – users include customers, partners, and employees; devices include computers, smartphones, routers, servers,…
December 14, 2022 -
Adversary in the Middle
An adversary-in-the-middle (AitM) attack, also known as a man-in-the-middle (MitM) attack, is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop…
December 15, 2022 -
Advanced Encryption Standard
Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S National Institute of Standards and Technology (NIST) in 2001. AES has an encryption key length…
December 15, 2022 -
Adaptive Authentication
Adaptive authentication is a dynamic type of multi-factor authentication that can be configured and deployed in a way that the identity service provider (IDP) system will select the right multiple authentication factors…
December 15, 2022 -
Artificial Intelligence
Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. Specific applications of AI include expert systems, natural language processing, speech recognition and machine vision. There are 7…
December 15, 2022 -
Asymetric Encryption
Asymmetric encryption is also known as public key cryptography. Asymmetric encryption was introduced to eliminate the need to share the key by using a pair of public-private key. Asymmetric encryption ensures that…
December 15, 2022 -
Authentication
Authentication technology protects and manages access to systems by checking to see if a user’s credentials match the credentials in a database of authorized users or in a data authentication server. The…
December 15, 2022 -
Biometric Encryption
Biometric Encryption is a group of emerging technologies that securely bind a digital key to a biometric or generate a digital key from the biometric, so that no biometric image or template…
December 15, 2022 -
Biometric Authentication
Authentication technology that protects and manages access to systems using biometric factor(s) for user verification.
December 15, 2022
Recent Blog Posts
- Watch Our Webinar with Juniper Research: “Accelerating Zero Trust with Unphishable Human Factor Authentication”
- Watch Our Tyfone Partner Spotlight Webinar On the Need for Secure Identity in Fintech
- What is Unphishable Multi-Factor Authentication?
- authID 2nd Annual Fintech Cybersecurity Survey Report
- PayPal Wasn’t Hacked, But its Customers Were – Now What?