Part two of my end of year posts regarding authentication. Sometimes it feels like technologists want to build a mansion for their users. Once you’re In the mansion, all doors are open. And for a unified suite of tools that one might use in, let’s just say, an office, that’s a rational approach. But security … Continue reading