Blog

Our everyday thoughts are presented here Music, video presentations, photo-shootings and more
    Loading posts...
  • Biometric Identification

    Biometric identification is a security process that relies on the unique biological characteristics of an individual to verify that they are who they say they are. Biometric identification systems compare a biometric…

  • Bot Attack

    the use of automated web requests to manipulate, defraud, or disrupt a website, application, API, or end-users. Bot attacks started out as simple spamming operations and have branched into complex, multinational criminal…

  • Bring Your Own Device

    Bring your Own Device (BYOD) is the set of policies in a business that allows employees to use their own devices – phone, laptop, tablet or whatever – to access business applications…

  • Client to Authenticator Protocol (CTAP)

    CTAP enables expanded use cases over previous FIDO standards. It enables external devices such as mobile handsets or FIDO security keys to work with browsers supporting WebAuthn, and also to serve as…

  • Digital Onboarding

    the practice of signing up for a customer account – such as a bank account, a credit card, insurance services or other electronic services entirely online or via a mobile device.

  • FIDO Authentication

    Based on free and open standards from the FIDO Alliance, FIDO Authentication enables password-only logins to be replaced with secure and fast login experiences across websites and apps.

  • FIDO2 Authentication

    FIDO2 is the overarching term for FIDO Alliance’s newest set of strong authentication standards. FIDO2 includes two specifications: W3C’s Web Authentication (WebAuthn) and FIDO Alliance’s Client to Authenticator Protocol (CTAP).FIDO2 standards enable…

  • General Data Protection Regulation (GDPR)

    a legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU).

  • Identity and Access Management (IAM)

    is the discipline that enables the right individuals to access the right resources at the right times for the right reasons. IAM addresses the mission-critical need to ensure appropriate access to resources…

  • Identity as a Service (IDaaS)

    refers to identity and access management services that are offered through the cloud or SaaS (software-as-a-service) on a subscription basis.