Are You Willing to Trade Data Privacy and Security for Convenience?

For those with even a hint of curiosity about data security, it's hard to miss the buzz surrounding the introduction of "Passkeys" and the collaboration between Apple, Microsoft, and Google in their q...
Read more

How to Mitigate the Risks and High Costs of Data Breaches. Part 3

This is the final installment of a multi-part series on the actual costs of data breaches and possible solutions that can be leveraged to protect your organization's data and bottom line. Read Part 1 ...
Read more

In the Age of FIDO, Does SSO Matter?

Preface: A question was raised on a FIDO forum recently on what "best practices" exist for integrating 0Auth2 with FIDO2 to enable Single Sign-On (SSO) to applications. While the poster was seeking a ...
Read more

How to Mitigate the Risk and High Costs of Data Breaches. Part 1

This is the first of a multi-part series on the actual costs of data breaches and possible solutions that can be leveraged to protect your organization's data and bottom line.
Read more

Chained to the Cloud: an IT Conundrum

Fun fact: There's a business that will accept Bitcoin (and other cryptocurrencies) to let you search supposedly “secure” files in AWS and Azure. AWS and Microsoft cloud contracts clearly explain that ...
Read more

Conclusions for PSD2 SCA

This article is part 7 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

FIDO2 for PSD2 SCA

This article is part 6 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

Smartphone + Biometrics for PSD2 SCA

This article is part 5 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

Europay, MasterCard, and Visa (EMV) Readers for PSD2 SCA

This article is part 4 of 7 in the series: An Evaluation of Strong Customer Authentication (SCA) Methods for the Revised Payment Services Directive (PSD2).
Read more

A Token for Your Thoughts on Vaultless Tokenization

In our efforts to fulfill our clients’ growing data storage and security demands, we often research new methods to perform our mission and carefully weigh whether or not these discoveries serve our cl...
Read more