Going passwordless? Start by looking for products with these three features

By Fred O'Connor | October 15, 2019
Organizations that are eliminating passwords are in good company. Microsoft is phasing out password authentication for its employees (and expects other businesses to do the same) and Gartner has noted that more enterprises are interested in going passwordless. But the identity and access management market is crowded with vendors offering some type of passwordless technology. […]
Read More

To succeed in security, think about the business

By Fred O'Connor | October 8, 2019
Deep security knowledge isn’t the only skill CISOs need. To succeed as a security leader, knowing how security can enable the business, especially around providing a better user experience, is also essential, judging by a panel discussion at the Financial Services CyberTech Forum, which was recently held in London. Security is a part of the […]
Read More

Cutting through the hype on true passwordless authentication

By Fred O'Connor | October 3, 2019
There’s a lot of vendor hype around authenticating without passwords. But many aren’t offering true passwordless authentication. Instead, they’re selling what can be called passwordfree authentication. What’s the difference? One emphasizes user convenience over security and the other truly eliminates passwords from authentication. Here’s a technical perspective from Veridium Chief Product Officer John Spencer. Passwordfree […]
Read More

Ecuador Data Breach: An Entire Nation’s Data Exposed

By James Stickland | October 2, 2019
Over 20 million Ecuadorians have had their personal data exposed online in a massive and unprecedented national data breach owing to an unsecured server. The Ecuadorian government confirmed that the details of 16.5 million living citizens, of whom 7 million are minors, as well as several million deceased individuals were exposed. The breach disclosed a […]
Read More

A smarter way to Know Your Customer

By Jason Tooley | September 24, 2019
In a fast evolving landscape where fraud and cyberattacks have hit an all-time high, one of the biggest issues now facing companies is how to verify customers in the most secure and seamless fashion. In response, many are now turning to more innovative methods of customer authentication such as biometrics. Amidst ever-rising fraud and data […]
Read More

How eliminating passwords improves the authentication experience for employees (and boosts productivity)

By Fred O'Connor | September 19, 2019
Employees face a less-than-stellar experience logging in to the many applications they use. First, they have to create unique passwords for all the applications, cloud services and tools that they need. There’s a password for Salesforce, Dropbox, WordPress, HubSpot, Citrix, G Suite and the desktop, among the many other applications employees rely on. Then they […]
Read More

Happy customers without the overhead: How Cuy Móvil uses Veridium to streamline SIM card registration

By Fred O'Connor | September 18, 2019
Before Cuy Móvil could bring more affordable mobile phone plans to Peru, it needed to figure out how people could register the SIM cards they purchased from the mobile operator with government. To help combat fraud, federal law requires people to register their SIM cards either using their fingerprints or national identity number. Selling SIM […]
Read More

Why enterprises are interested in passwordless authentication

By Fred O'Connor | September 12, 2019
Everyone seems to want to stop using passwords. Security and IT professionals loathe them because they’re a key infiltration tool. Anyone who handles user experience dislikes passwords because they’re not very user friendly. Despite grumbling about passwords, they’ve been the main way we authenticate since the 1960s, mainly because no one has come up with […]
Read More

Passwords, employees and the battle for productivity

By Fred O'Connor | September 5, 2019
A productivity battle is being fought at offices everywhere. On one side is the user, who just wants to file that report or send that email. On the other, is the authentication process that requires using a password to log in to the many tools and services employees need to complete their jobs.A password is […]
Read More