From Strong Authentication

Biometric Authentication

Banking on the Future with Biometric Innovation

Share Button

Cybercriminals make billions of dollars each year preying on naïve users and vulnerable businesses. Individual attackers, criminal bands, and state actors seldom rest on their laurels; greed drives them to constantly improve their attack strategies. Read more

Uber Data Breach

Uber Taken for a Ride by Hackers, Then Tried to Cover It Up

Share Button

Uber has had a difficult year. It took another hit last week with the news that it had covered up a data breach that occurred more than a year ago. Read more

Implementing DMARC

How to Strengthen Your DMARC Protection in 6 Steps

Share Button

Deploying DMARC can seem confusing and overwhelming at first. In our previous blog post on the topic, we talked about basic tips to keep in mind when deploying a DMARC record. Read more

Biometrics

Why Biometrics Remains the Front-Runner to Replace Passwords

Share Button

Biometric technology has long been touted as the replacement for traditional passwords, and many security researchers are investing in research into the technology. Read more

Digital Threats

Latest IRS Scam Shows Need for Proactive Defense Against Digital Threats

Share Button

A new scam is tarnishing the reputation and image of organizations by tricking businesses and individuals. Read more

Fake news and digital trust

Fake News and Digital Trust: How to Take Back Control of the Web from Cybercriminals

Share Button

Last year was an unprecedented time for cyber security and fraud with a record number of exploited vulnerabilities and high-profile breaches. Read more

DKIM email authentication

Leveraging the Power of Email Authentication – Part 3: Implementing DKIM

Share Button

This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
Read more

Fraud case automation

Automation: Cut Fraud Investigation Costs, Not Customer Satisfaction

Share Button

Companies are constantly looking for ways to streamline their business processes and ensure that legitimate customer activity is kept safe. Read more

phishing

Phishing Attack Analysis: Estimating Key Cluster Features and Why It’s Important

Share Button

A recent report showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent post we showed how Read more