Simplifying legal entity identification in the digital age

As the world’s legal entities rush to digitize their processes and transactions, confidence in digital authenticity is in short supply. Thankfully, a single, open and universal protocol that will enable legal entities everywhere to verify the authentic… Continue reading Simplifying legal entity identification in the digital age

Using the random motion of electrons to improve cybersecurity

In October 2017, Yahoo! disclosed a data breach that had leaked sensitive information of over 3 billion user accounts, exposing them to identity theft. The company had to force all affected users to change passwords and re-encrypt their credentials. In… Continue reading Using the random motion of electrons to improve cybersecurity

OAuth2 – What is the advantage of using certificate over client secret credentials? (Azure)

When using OAuth2 in Azure, why Certificates are more secure than using Secrets?
The Secrets have expiration and are strong, and generated automatically.
The application needs to send a JWT containing a x5t header with the thumbprint of th… Continue reading OAuth2 – What is the advantage of using certificate over client secret credentials? (Azure)

Password reuse is rampant among Fortune 1000 employees

SpyCloud published an annual analysis of identity exposure among employees of Fortune 1000 companies in key sectors such as technology, finance, retail and telecommunications. Drawing on a database of over 200 billion recaptured assets, researchers ide… Continue reading Password reuse is rampant among Fortune 1000 employees