How the future will blur the lines of authentication & identity management
Identity theft is now the number one attack vector – and the truth is, attackers love weak passwords.
According to Verizon’s 2017 Data Breach Investigation Report, 81% of hacking-related breaches leveraged stolen or weak passwords.
This puts the most common authentication techniques under the spotlight. Businesses are deploying the applications they need to meet business objectives and at the same time, there are more ‘identity islands’ in a sea of shadow IT.
It’s no surprise that the multi-factor authentication market is rapidly expanding. It now encompasses the likes of passwords, biometrics, tokens, grid cards, behavioural intelligence and much more.
Read more at – How the future will blur the lines of authentication & identity management