From Authentication

Risk Orchestrator

Video Blog: Unify Your Fraud Protection Stance

Share Button

It’s no secret that a layered approach is the key to a successful anti-fraud strategy. Read more

Passwordless Authentication

The Unofficial Guide to Passwordless Authentication - Part 2

Share Button

We’ve said it before, and we’ll say it again: It’s time to get rid of passwords. Read more

Guide to Passworldless Authentication

The Unofficial Guide to Passwordless Authentication - Part 1

Share Button

As we get closer to the 60th anniversary of the digital password, the calls to ditch the antiquated technology are getting louder and more widespread.  Read more

Passwordless Authentication

Video Blog: What Is Passwordless Authentication?

Share Button

The password is dead. With an overwhelming 81% of data breaches occurring as a result of stolen or compromised credentials, passwords fail to provide secure access for end users. Read more

Passwordless Authentication

Passwordless Access: The Future of Authentication?

Share Button

Nearly all data breaches start with compromised passwords. Whether it be through sophisticated phishing, brute force attacks, social engineering, or any other kind of credential harvesting, the password is the first, and sometimes only, line of defense against cyberattacks. Read more

Case Study: Transaction Security for a Non-Digital Organization

Share Button

In an increasingly digital age, both attacks and security are also increasingly digital. However, what about institutions that cannot digitize their transactions? Read more

Biometric Authentication

Banking on the Future with Biometric Innovation

Share Button

Cybercriminals make billions of dollars each year preying on naïve users and vulnerable businesses. Individual attackers, criminal bands, and state actors seldom rest on their laurels; greed drives them to constantly improve their attack strategies. Read more

DMARC

US Government Now Requiring Federal Agencies to Implement DMARC

Share Button

The US Department of Homeland Security (DHS) recently announced a new policy requiring that all federal agencies implement a DMARC policy to protect their email domains. Read more

Implementing DMARC

How to Strengthen Your DMARC Protection in 6 Steps

Share Button

Deploying DMARC can seem confusing and overwhelming at first. In our previous blog post on the topic, we talked about basic tips to keep in mind when deploying a DMARC record. Read more

SS7 SMS-Based Exploit: A Wake-Up Call to Shift to Stronger Two-Factor Authentication

Share Button

Signal System 7 (SS7) is the standard signaling language used to send text messages (SMS) around the world. The technology has been employed in various communication channels for almost 40 years Read more