You may have seen in the press this week that a major, US-based, cyber security vendor fell victim to a data breach. This particular breach involved compromised...
Identity and Access Management (IAM) and Identity as a Service (IDaaS) vendors typically store some of the most sensitive corporate data on behalf of their...
With Verizon reporting that 82% of data breaches involved the Human Element, why are businesses still using passwords and putting their security and reputation in...
Brute force attacks are one of the oldest and simplest methods for cracking passwords – whereby an attacker simply submits as many passwords as possible, relying on...
The cyber risks posed to organisations from password-based authentication are increasingly well-known, but there are a variety of approaches that businesses can...
Identity and Access Management (IAM) solutions ensure the right people have access to the right applications to do their job. By managing user access to systems and...
My1Login will be exhibiting at DTX Manchester on 27th and 28th April 2022. Also at the event, one of our customers, Liam Mahon, Director of Digital & Innovation...
Ransomware dominated the headlines in the biggest cyber security attacks of the last 12 months. In fact, according to the investigative analytics firm Cognyte, the...
Mandating password change is a common feature in many corporate password policies, yet advice over whether or not this is beneficial to organisations has changed...