Skip to main content

44 posts tagged with "authentication"

View All Tags

Microsoft has a monopoly on identity, and everyone knows it except the FTC

· 7 min read
Jens Langhammer
CTO at Authentik Security Inc

The FTC (Federal Trade Commission) punished Microsoft for exerting its power in 2001, but Microsoft learned to hide its power, especially when Satya Nadella took over from Steve Ballmer and pursued a services model that builds and leverages power while maintaining plausible deniability.

At Authentik, we’ve seen the monopolistic powers that Microsoft has over the identity management sector, but identity is a canary in the coal mine for a much wider, much stronger monopoly.

Demystifying Security: The Importance of SSO for Businesses of All Sizes

· 8 min read
Jens Langhammer
CTO at Authentik Security Inc

In today's digital world, security is a critical aspect of any organization's operations. While some may perceive security as an enterprise-level feature, it is essential for businesses of all sizes to prioritize and implement robust security measures. One of the most common security measures is to implement Single Sign-On (SSO), a digital authentication method that uses a single set of credentials to access multiple applications.

Supply chain attacks: what we can all do better

· 9 min read
Jens Langhammer
CTO at Authentik Security Inc

Supply chains, whether for automotive parts or microprocessors, are complex, as we all know from recent history. Modern software, with more components than ever and automated package management, is also complex, and this complexity provides a rich environment for supply chain attacks. Supply chain attacks inject malicious code into an application via the building blocks of the application (for example, dependencies) in order to compromise the app in order to infect multiple users.