From Strong Authentication

Guide to Passworldless Authentication

The Unofficial Guide to Passwordless Authentication - Part 1

Share Button

As we get closer to the 60th anniversary of the digital password, the calls to ditch the antiquated technology are getting louder and more widespread.  Read more

Passwordless Authentication

Video Blog: What Is Passwordless Authentication?

Share Button

The password is dead. With an overwhelming 81% of data breaches occurring as a result of stolen or compromised credentials, passwords fail to provide secure access for end users. Read more

Biometric Authentication

Banking on the Future with Biometric Innovation

Share Button

Cybercriminals make billions of dollars each year preying on naïve users and vulnerable businesses. Individual attackers, criminal bands, and state actors seldom rest on their laurels; greed drives them to constantly improve their attack strategies. Read more

Implementing DMARC

How to Strengthen Your DMARC Protection in 6 Steps

Share Button

Deploying DMARC can seem confusing and overwhelming at first. In our previous blog post on the topic, we talked about basic tips to keep in mind when deploying a DMARC record. Read more

Biometrics

Why Biometrics Remains the Front-Runner to Replace Passwords

Share Button

Biometric technology has long been touted as the replacement for traditional passwords, and many security researchers are investing in research into the technology. Read more

Digital Threats

Latest IRS Scam Shows Need for Proactive Defense Against Digital Threats

Share Button

A new scam is tarnishing the reputation and image of organizations by tricking businesses and individuals. Read more

Fake news and digital trust

Fake News and Digital Trust: How to Take Back Control of the Web from Cybercriminals

Share Button

Last year was an unprecedented time for cyber security and fraud with a record number of exploited vulnerabilities and high-profile breaches. Read more

DKIM email authentication

Leveraging the Power of Email Authentication – Part 3: Implementing DKIM

Share Button

This article is Part 3 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 2: Using DKIM to Enable DMARC.
Read more

Fraud case automation

Automation: Cut Fraud Investigation Costs, Not Customer Satisfaction

Share Button

Companies are constantly looking for ways to streamline their business processes and ensure that legitimate customer activity is kept safe. Read more

phishing

Phishing Attack Analysis: Estimating Key Cluster Features and Why It’s Important

Share Button

A recent report showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent post we showed how Read more