Biometrics
BLOG LISTINGS
April 30, 2024
In this blog, we're delving into behavioral authentication, a cutting-edge solution poised to tackle inherent security...
March 20, 2023
In contact centers, security is more important than ever before. Still, strict clean desk policies and the cost of hard...
February 23, 2023
Cyberattacks are increasingly frequent and expensive (up to $4.4M in ‘22). Research shows that in almost all of these...
February 14, 2023
Biometric technology has become increasingly versatile in application and is something that most of us use daily. From...
February 8, 2023
Multi-factor authentication is a foundational component of every well-rounded security posture. In March 2024, it will...
May 9, 2022
As we’ve mentioned in the past, phones aren’t allowed in contact centers and hard tokens are too difficult to manage...
Posts by Tag
- 2FA (8)
- Agent Identity (4)
- Agile (1)
- Automated MFA (4)
- Behavioral MFA (21)
- Biometrics (19)
- BPO (20)
- Burnout (1)
- CCaaS (1)
- Clean Desk MFA (1)
- Compensating Controls (2)
- Compliance (18)
- Contact Centers (41)
- Continuous Authentication (52)
- Continuous MFA (24)
- Cryptocurrency (1)
- Culture (3)
- Cyber Insurance (1)
- Cybersecurity (27)
- Data Breach (12)
- Data Science (1)
- Deep Work (1)
- Flow State (1)
- Hard Tokens (1)
- Identity Access Management (1)
- Infosec (14)
- Machine Learning (5)
- Mental Health (3)
- MFA (5)
- Multi-Factor Authentication (46)
- Passive Biometrics (10)
- Passive MFA (1)
- Password Sharing (1)
- Passwordless (1)
- PCI Compliance (9)
- PCI DSS (14)
- Phishing (5)
- Phishing-Resistant MFA (9)
- Preparedness (1)
- Prompt Bombing (3)
- RFPs (1)
- SOC2 (1)
- Social Engineering (4)
- Software MFA (1)
- Twosense Team (2)
- Unauthorized Users (1)
- Unphishable MFA (11)
- WAHA (1)
- Webinar (1)
- WFH (4)
- Zero Trust (10)
Recent Posts
Sign Up for our Blog
We will never share your email address with third parties.