By Jan Lunter
Incidents such as the loss of millions of dollars through cyber identity theft at Microsoft Exchange have captured our attention throughout the pandemic. Now, more than ever, companies are keen to manage their digital infrastructure and protect it from unauthorized access. The need for actively and passively controlling identity and authenticating users




