Blog

Blog

Discover the world of identity security, orchestration and authentication. Stay up-to-date with the latest IAM news, industry insights and emerging technologies from Transmit Security.

thumbnail
Your employees' private Google account put you at risk

I’ve mentioned the importance of identifying the weakest links in your security architecture. Every security architecture has a weakness that must be identified...

thumbnail
5 Easy Ways Hackers Can Obtain Your Personal Information

Santander U.K. recently warned that celebrities were setting a bad example on social sites by oversharing personal information, including pet names and dates...

thumbnail
The Rise of Edge Computing: Is Cloud the New Mainframe?

If you work in Automotive or Manufacturing, Edge computing is naturally a hot topic for you. However, if you work in a global...

thumbnail
Biometrics for convenience is different than biometrics for security

This month at Black Hat a researcher demonstrated how to bypass Apple\'s Face ID liveness detection using some tape and a pair of...

thumbnail
A trick for remembering an endless number of passwords

The average business employee must keep track of 191 passwords. Whether this number is accurate or not, we all have too many passwords...

thumbnail
The Value of SMS One-Time Passcodes and Why They Shouldn't be Banned

German banks are reportedly moving away from SMS one-time passcodes. Let me first say that I\'m not a big fan...

1 10 11 12