From Multi-Factor Authentication

Risk Orchestrator

Video Blog: Unify Your Fraud Protection Stance

Share Button

It’s no secret that a layered approach is the key to a successful anti-fraud strategy. Read more

Passwordless Authentication

The Unofficial Guide to Passwordless Authentication - Part 2

Share Button

We’ve said it before, and we’ll say it again: It’s time to get rid of passwords. Read more

Guide to Passworldless Authentication

The Unofficial Guide to Passwordless Authentication - Part 1

Share Button

As we get closer to the 60th anniversary of the digital password, the calls to ditch the antiquated technology are getting louder and more widespread.  Read more

Passwordless Authentication

Video Blog: What Is Passwordless Authentication?

Share Button

The password is dead. With an overwhelming 81% of data breaches occurring as a result of stolen or compromised credentials, passwords fail to provide secure access for end users. Read more

Fraud Predictions

Predictions 2018: Human Manipulation Is the Standard, Obsessing Over End User Authentication Becomes the Norm

Share Button

As 2017 comes to a close, people start to take stock of the
past year and what’s in store for the coming one.Not ones
to be left out, we’ve compiled our own list of what we can
expect to see on the cyber threat landscape in 2018. Read more

SS7 SMS-Based Exploit: A Wake-Up Call to Shift to Stronger Two-Factor Authentication

Share Button

Signal System 7 (SS7) is the standard signaling language used to send text messages (SMS) around the world. The technology has been employed in various communication channels for almost 40 years Read more

SMS-delivered password

Is Strong Authentication Killing the SMS-Delivered Password?

Share Button

Over the past few years, there has been a noticeable move away from what has been the norm for decades – communication and business conducted in person or over the phone – toward increasingly digital-only interaction. Read more

SMS two-factor authentication

SMS 2FA Is Dead. Long Live 2FA

Share Button

Despite what many believe to be a major inconvenience, multi-factor identification has long been recognized as an effective method of lessening the impactof a potential breach on end users. Read more

biometrics

Biometrics a Convenient Addition, But No Silver Bullet

Share Button

We often say no product or solution is a “silver bullet” for fraud. In order to fend against the rich mosaic of cyberattacks threatening organizations, multi-factor Read more

biometric authentication

Fingerprints Stolen During OPM Breach: The Pros and Cons of Biometric Authentication

Share Button

Just when we thought the OPM breach couldn’t get any worse, OPM disclosed that approximately 5.6 million fingerprints were stolen as part of the hack. While it remains unclear if these fingerprints can Read more