Identity


Here are Risks and Solutions of Identity Account Takeover

OFFER ISRAELI GVP & GM, Identity Threat Defense, Proofpoint recently  wrote: “Attackers are increasingly focused on privileged identity account takeover (ATO) attacks because they can compromise organizations much more easily and quickly this way, as compared to the time, effort, and cost to exploit a software vulnerability (a common vulnerability and exposure or CVE). And […]


7 Reasons you should NOT use Free Authenticator Apps

And why you should use Strong MFA instead Despite the call from world leaders for strong Multi-Factor Authentication (MFA) to protect individuals and organizations against cyber-attack, the vast majority just isn’t up to snuff when it comes to security. Most of us know that security starts with Identity and Authentication – ensuring that users Are […]


Zero Trust Security & Identity and Access Management (IAM)

Time to Fix What’s Broken Zero Trust Security & Identity and Access Management need to be updated for the modern workplace. The days of Castle-and-Moat security for the organization – where everything was considered secure inside corporate perimeter walls – are over. Today, users are seldom in one place, so security must consider every identity […]


Why to choose TraitWare for Trust and Security.

A People Story TRUST. It’s a people thing. Not a technology thing. People build reliable technology. Not the other way around. Choosing which cybersecurity tools you trust to implement and use starts with people. If you’re looking for a solution, you need to know what exactly they are selling, who’s behind it, what problems the […]


How to cyber protect Your Business from Island Hopping?

Island Hopping - NOT a Holiday Thing


You can’t have Security without Privacy

Privacy vs. Security. Can you have both? While there’s a difference, we think the two belong together – especially when it comes to Identity. While data security has become increasingly important for companies of all sizes – with the risk and severity of cyberattack steadily rising – regulations like GDPR, CCPA mean companies are also having […]


Face Verification: How It Optimizes Passwordless MFA?

How do you secure identity and transactions—especially business, financial, government transactions—in a world that is becoming more and more digital and hyperconnected? It’s time to move on from old and increasingly vulnerable authentication methods, like ID cards and the username-and-password combo, to newer methods that pose a tougher challenge for cybercriminals to get past.   Today’s […]


BUSTING MYTHS: THE TRUTH ABOUT BIOMETRICS

FOR IDENTITY & ACCESS MANAGEMENT With cybercrime in today’s headlines almost daily, companies are looking to modernize security protocols. Biometrics are being widely adopted for greater security and for improved user experience. Yet some are still hesitant to make the shift. Here are a few myths about biometrics that need busting: 1. Biometric images can […]


A Paradigm Shift in IAM – The Move to Zero Trust Access

A person's identity is the first pillar in a Zero Trust framework. Achieving True Zero Trust Access requires having MFA inherent upon account creation.


Not Safe in the Cyber Streets

Seemingly every day, companies of all sizes unknowingly expose valuable information to cybercriminals around the world. No matter the industry, cyber terrorists will seek to gain control of data in exchange for large sums of money through ransomware attacks. These cybercriminals spare no mercy. Electronic Arts’ critical code exposed One recent victim of a data […]


Why Passwords shouldn’t be stored in the Browser

No one likes the Password. Clunky, frustrating, and by now, we all know they’re not particularly secure, as almost daily we hear news of cyberattacks with compromised user credentials as the root cause. But until they go away, there is a proper way to manage them. Here, are a few quick DOs and DON’Ts around […]


Why Password Reuse Makes the Case for Going Passwordless  

Businesses and individuals alike are far from doomed to live with all the inconvenience and risks posed by passwords and the management challenges that they entail.