Passwordless Authentication


Let’s Discuss Account Takeover, or “ATO”. 

What can we do to better protect ourselves and our companies from account takeover?  Most of us today still believe we are “too small a fish” to have one of our digital accounts taken over. We think to ourselves that no one wants to read my email or post from my Twitter account or comment […]


HOW TO HACK A PASSWORD

Password Hacking or Cracking has evolved over the years, with instances of serious credential-based attacks topping headlines daily. Why? It’s become frighteningly easy for cybercriminals to get your password. Several high-profile attacks in recent news (SolarWinds, The US Pipeline … and so on) sparked an executive order from the White House calling for improved cybersecurity […]


BACK TO SCHOOL FOR CYBERCRIME WITH TRAITWARE.

Schools are top targets for Cybercrime. It’s time to get educated and educate about the risks, and how to implement a Zero Trust framework for security. With students of all ages still in the early days of their academic year, cybersecurity experts issue stern warnings about cybercrime in schools.  With the increased use of technology […]


What is Real Passwordless MFA?

What is Real Passwordless MFA and Why is it Essential for Enterprise Security? In light of the sharp rise in cyber attacks worldwide – from ransomware to phishing scams to man-in-the-middle attacks – we’ve been told by the likes of Microsoft, countless cybersecurity experts, and even the President of the United States, that it’s time […]


A Paradigm Shift in IAM – The Move to Zero Trust Access

A person's identity is the first pillar in a Zero Trust framework. Achieving True Zero Trust Access requires having MFA inherent upon account creation.


What Are the Best Practices for User Provisioning and De-provisioning?

  User provisioning is a standard component of onboarding and involves creating user accounts for a newly hired employee. It entails access to IT resources (including the directory) and to systems, networks, and applications that are vital to the employee’s performance of their job. The usual IT resources provided to a new employee include the […]


ZeroTrust and work from Mars, By Chris Werpy, COO, PlanetOne

As our Planet made the shift to work from wherever, remote access exploded in numbers and speed, with capacity taking the lead.  Looking ahead, it’s time to determine how to not only keep the lights on, but to drive increased productivity without compromising security. Is the environment we work in today designed for the future, […]


Make MFA Adoption Easier for Everyone in Your Organization

Multifactor authentication (MFA) is a must for enterprises to ensure data security in the face of both new attacks and persistent older ones that are constantly being fine-tuned by cybercriminals. It offers multiple layers of security to your login processes through multiple means of authentication.  However, while MFA is intended to thwart cybercriminals attempting to […]


How Passwordless Authentication Remarkably Improves Today’s Customer Experience

How do you attract and retain customers in an age when customer experience that spans multiple touchpoints has become the rule rather than the extraordinary exception? The technological advances over the last decade have been nothing short of breathtaking. The links that have been made possible, the virtual connections, experiences, and transactions that are now […]


TraitWare® offers FREE Passwordless Login Security to Citrix customers

TraitWare® offers FREE Passwordless Login Security to Citrix customers First and foremost, the health and safety of friends and families takes precedence.  With the developing changes surrounding the COVID-19 emergency, companies are adopting rapid procedures to help protect their employees.  The most immediate change that most companies are adopting is a shift to working remotely.    […]


Improve User Experience through Passwordless Authentication Enhances Productivity

An unproductive workforce can harm your bottom line. That’s the long and short of it.  This is why you need to improve user experience. In detail, employee un-productivity affects overall organizational morale, particularly after poor performance and missed deadlines followed by poor customer reviews, loss of clients, failure to land clients, and so on.  One […]


Common Issues with Passwords as a means of Authentication

Though the creation of the passwords was originally intended to protect online data, in today’s IT environment, passwords are considered one of the weakest links in security. The era of passwords is about to end. In fact, most cyberattacks across the web stem from compromised passwords. It’s about time we acknowledge the major failings of […]