May 21, 2022 | Uncategorized
Authentication protocols have evolved rapidly since the first authentication using password was introduced in 1961 by Fernando Corbato, an MIT researcher. In 1960s, computers were huge and outrageously expensive with many users accessing the centralized computers...
Apr 26, 2022 | News, News, News, News
Protecting Your Most Valuable Assets Company’s information is increasingly considered as key corporate assets. Customers’ information, financial data, important documents and product blueprints are examples of important and sensitive data that must be guarded from...
Apr 5, 2022 | Yubico, Yubico, Yubico, Yubico
Technology has made remote working much more feasible and economical compared to on-site working. Although it is not popular until a decade ago, remote working has now become the new norm of how employees work, especially during the pandemic. In fact, a survey on more...