From Authentication

DKIM email authentication

Leveraging the Power of Email Authentication – Part 3: Implementing DKIM

Share Button

This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
Read more

SMS-delivered password

Is Strong Authentication Killing the SMS-Delivered Password?

Share Button

Over the past few years, there has been a noticeable move away from what has been the norm for decades – communication and business conducted in person or over the phone – toward increasingly digital-only interaction. Read more

Effective Device Identification

More Precise Authentication through Effective Device Identification

Share Button

Fraudsters and cybercriminals react to the introduction of new security solutions by moving to a different part of the value chain or by changing and updating their attack methods.This is why it is important to have a holistic strategy Read more

DKIM

Leveraging the Power of Email Authentication – Part 2: Using DKIM to Enable DMARC

Share Button

This article is Part 2 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 3: Implementing DKIM

What is DKIM?

Domain Keys Identified Mail (DKIM) is an email authentication mechanism that allows an email receiver Read more

SMS two-factor authentication

SMS 2FA Is Dead. Long Live 2FA

Share Button

Despite what many believe to be a major inconvenience, multi-factor identification has long been recognized as an effective method of lessening the impactof a potential breach on end users. Read more

biometrics

Biometrics a Convenient Addition, But No Silver Bullet

Share Button

We often say no product or solution is a “silver bullet” for fraud. In order to fend against the rich mosaic of cyberattacks threatening organizations, multi-factor Read more

Tokens

Mobile Tokens Are More Effective with a Fortified Device

Share Button

Since HOTP and TOTP algorithms are the technological backbone of a wide variety of tokens used as a second authentication factor, they are very effective at creating unpredictable one-time passwords. Read more

DMARC compliance

United Kingdom’s Decision to Mandate DMARC Compliance: Good for the Government, Great for the Public

Share Button

According to an article that ran in The Guardian, in 2012 United Kingdom topped the global list of nationstargeted by phishing Read more

Faster Payment Solution

Exploring the Security and Fraud Challenges of a Faster Payment Solution in the United States

Share Button

With the submission period for faster payment solution proposals having recently come to a close, Read more

Amazon Pay by Selfie

Amazon Wants to Patent Pay by Selfie, but Technology Already Available Today

Share Button

Amazon recently filed a patent for a process that would allow shoppers to make a purchase by taking a photo and/or video of themselves, also known as pay by selfie. Narcissistic? Perhaps. Read more