Every website or mobile app with a login form is a potential target for account takeover attacks. An “account takeover” is the process by which hackers and fraudsters use ill-gotten credentials to gain access to legitimate customers’ accounts.
Most of these attacks are automated and driven by malicious bots. The rise of bots is mirrored by the…
Before public cloud services, computing infrastructure was expensive, hosted on-premises, and reserved for big enterprises and universities. Now, anyone with a credit card can access an unlimited supply of cloud apps and computing power.
While cloud services offer many benefits, the accessibility of the cloud has also made identity attacks…
We recently delivered a webinar featuring Gartner research on the latest trends impacting customer identity and access management (CIAM). Gartner’s Research Vice President Mary Ruddy presented findings from her March 2018 research, Top 5 Trends in CIAM Solution Design. Discussion in the webinar included the challenges organisations face in keeping…