Identity Hub

Identity Hub

Dive into a pool of passwordless lexicon. Explore topics on biometrics and identity experiences to discover what it all means.

thumbnail
Authentication in E-Commerce

In the early 2000s, people hotly debated whether e-commerce would be a viable business model. Over the last twenty years, the debate has become non-debatable,...

thumbnail
Identity Management in Healthcare

As a highly regulated industry, the healthcare industry needs to have robust Identity and Access Management (IAM) policies, procedures, and practices. At the same time,...

thumbnail
OpenID Connect (OIDC) vs OAuth2

In some situations, one application may need access to data held by another application. A common example is a list of contacts used to send...

thumbnail
What is Identity Verification?

Before setting up an account or beginning a relationship with a customer, companies commonly want to validate that the applicant is who they claim to...

thumbnail
What Is Multi-factor Authentication (MFA)?

Traditional, password-based authentication is insecure. People commonly choose weak passwords or reuse the same password across multiple different accounts. This makes it easy for cybercriminals...

thumbnail
Password Resets

The average person is locked out of ten online accounts per month due to a forgotten password. Password resets provide a solution; however, 57% of...

thumbnail
Passwordless Authentication: A Complete Guide [2022]

Passwordless authentication refers to any identity verification method that doesn’t use a password. Examples of passwordless authentication include physical security keys, authenticator apps,...

thumbnail
Authentication vs. Authorization: What’s the Difference?

Authentication? Authorization? It’s all just logging in, right? Not exactly. While both terms are well known yet often used interchangeably, they are separate processes that...

thumbnail
What Is Security Fatigue and How to Curb It

Much like the fatigue being experienced due to COVID-19, your customers are inundated with news about data breaches and how their private data...

1 2 3 4