Blog

Our everyday thoughts are presented here Music, video presentations, photo-shootings and more
    Loading posts...
  • Active Directory

    Active Directory (AD) is a database and set of services that connect users with the network resources they need to get their work done. The database (or directory) contains critical information about…

  • Access Management

    Is a broad concept that encompasses the policies, processes, methodologies, and tools that manage user privileges. In access management – users include customers, partners, and employees; devices include computers, smartphones, routers, servers,…

  • Adversary in the Middle

    An adversary-in-the-middle (AitM) attack, also known as a man-in-the-middle (MitM) attack, is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop…

  • Advanced Encryption Standard

    Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S National Institute of Standards and Technology (NIST) in 2001. AES has an encryption key length…

  • Adaptive Authentication

    Adaptive authentication is a dynamic type of multi-factor authentication that can be configured and deployed in a way that the identity service provider (IDP) system will select the right multiple authentication factors…

  • Artificial Intelligence

    Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. Specific applications of AI include expert systems, natural language processing, speech recognition and machine vision. There are 7…

  • Asymetric Encryption

    Asymmetric encryption is also known as public key cryptography. Asymmetric encryption was introduced to eliminate the need to share the key by using a pair of public-private key. Asymmetric encryption ensures that…

  • Authentication

    Authentication technology protects and manages access to systems by checking to see if a user’s credentials match the credentials in a database of authorized users or in a data authentication server. The…

  • Biometric Encryption

    Biometric Encryption is a group of emerging technologies that securely bind a digital key to a biometric or generate a digital key from the biometric, so that no biometric image or template…

  • Biometric Authentication

    Authentication technology that protects and manages access to systems using biometric factor(s) for user verification.