From Authentication

Biometric Authentication

Banking on the Future with Biometric Innovation

Share Button

Cybercriminals make billions of dollars each year preying on naïve users and vulnerable businesses. Individual attackers, criminal bands, and state actors seldom rest on their laurels; greed drives them to constantly improve their attack strategies. Read more

Uber Data Breach

Uber Taken for a Ride by Hackers, Then Tried to Cover It Up

Share Button

Uber has had a difficult year. It took another hit last week with the news that it had covered up a data breach that occurred more than a year ago. Read more

DMARC

US Government Now Requiring Federal Agencies to Implement DMARC

Share Button

The US Department of Homeland Security (DHS) recently announced a new policy requiring that all federal agencies implement a DMARC policy to protect their email domains. Read more

Implementing DMARC

How to Strengthen Your DMARC Protection in 6 Steps

Share Button

Deploying DMARC can seem confusing and overwhelming at first. In our previous blog post on the topic, we talked about basic tips to keep in mind when deploying a DMARC record. Read more

SS7 SMS-Based Exploit: A Wake-Up Call to Shift to Stronger Two-Factor Authentication

Share Button

Signal System 7 (SS7) is the standard signaling language used to send text messages (SMS) around the world. The technology has been employed in various communication channels for almost 40 years Read more

DKIM email authentication

Leveraging the Power of Email Authentication – Part 3: Implementing DKIM

Share Button

This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
Read more

SMS-delivered password

Is Strong Authentication Killing the SMS-Delivered Password?

Share Button

Over the past few years, there has been a noticeable move away from what has been the norm for decades – communication and business conducted in person or over the phone – toward increasingly digital-only interaction. Read more

Effective Device Identification

More Precise Authentication through Effective Device Identification

Share Button

Fraudsters and cybercriminals react to the introduction of new security solutions by moving to a different part of the value chain or by changing and updating their attack methods.This is why it is important to have a holistic strategy Read more

DKIM

Leveraging the Power of Email Authentication – Part 2: Using DKIM to Enable DMARC

Share Button

This article is Part 2 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 3: Implementing DKIM

What is DKIM?

Domain Keys Identified Mail (DKIM) is an email authentication mechanism that allows an email receiver Read more

SMS two-factor authentication

SMS 2FA Is Dead. Long Live 2FA

Share Button

Despite what many believe to be a major inconvenience, multi-factor identification has long been recognized as an effective method of lessening the impactof a potential breach on end users. Read more