As the threat landscape broadens, it’s essential that organizations adopt techniques that bring greater security and ‘close the front door’ to attackers, as stolen credentials are still one of the biggest threats. But at the same time, it’s essential not to put more barriers in the way of users and bother authorized users with processes unless there is a risk. Fortunately, there are multiple methods of authentication that are more secure and run numerous risk checks invisibly in the background, such as geo-location, threat detection capabilities and biometrics. Read more…