From Strong Authentication

Biometrics

Why Biometrics Remains the Front-Runner to Replace Passwords

Share Button

Biometric technology has long been touted as the replacement for traditional passwords, and many security researchers are investing in research into the technology. Read more

Digital Threats

Latest IRS Scam Shows Need for Proactive Defense Against Digital Threats

Share Button

A new scam is tarnishing the reputation and image of organizations by tricking businesses and individuals. Read more

Fake news and digital trust

Fake News and Digital Trust: How to Take Back Control of the Web from Cybercriminals

Share Button

Last year was an unprecedented time for cyber security and fraud with a record number of exploited vulnerabilities and high-profile breaches. Read more

DKIM email authentication

Leveraging the Power of Email Authentication – Part 3: Implementing DKIM

Share Button

This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
Read more

Fraud case automation

Automation: Cut Fraud Investigation Costs, Not Customer Satisfaction

Share Button

Companies are constantly looking for ways to streamline their business processes and ensure that legitimate customer activity is kept safe. Read more

phishing

Phishing Attack Analysis: Estimating Key Cluster Features and Why It’s Important

Share Button

A recent report showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent post we showed how Read more