Search results: authentication

A Modern Approach to Authentication for Modern Times – Simple, Accurate & Frictionless

| | Blog
With the US Federal Trade Commission (FTC) revealing that it received 3.6 million identity theft and fraud reports in 2020 – up from 2.4 million in 2019 – organizations are realizing that ...
Why You Need to Get Serious About Multi-Factor Authentication

Why You Need to Get Serious About Multi-Factor Authentication

|
Multi-factor authentication (MFA) is one step which everyone should be taking to add an extra layer of security to account logins ...

What Does It Take to Be Secure with Multi-Factor Authentication?

| | all posts
In our four-part series investigating the vulnerabilities of multi-factor authentication (MFA), we’ve learned a lot about the methods hackers use to crack these systems. Social engineering, technical hacks, and a mixture of ...
Product-Passwordless-Login

Role of Consumer Identity Authentication in Digital Banking

|
Digital identity, as the boundary of online services, is critical to online banking. Consumer-friendly identity and user management in banking are critical not just for offering seamless experiences, but also for protecting ...
vmc phone

Gmail support for BIMI is a major milestone for strong email authentication

Earlier today, Google announced its support for Brand Indicators for Message Identification (BIMI), an industry standard that aims to drive... The post Gmail support for BIMI is a major milestone for strong ...
vmc phone

Gmail support for BIMI is a major milestone for strong email authentication

Earlier today, Google announced its support for Brand Indicators for Message Identification (BIMI), an industry standard that aims to drive... The post Gmail support for BIMI is a major milestone for strong ...
The Tripwire Cybersecurity Podcast

The False Identity Frenzy and the Need for Authentication

Emil Sayegh, president and CEO of Ntirety, unpacks the issue of inauthentic identities opening doors to untraceable, fake social accounts and the impact that it has on society. Emil is a cloud ...
API Security 1: Unauthenticated APIs

API Security Best Practices: Avoiding the Top 5 Authentication Errors

API authentication errors are listed as the top two threats outlined in the OWASP API Security Top 10, both of which can be traced back to many of the recent publicly disclosed ...
API Security 101: Broken User Authentication

API Security 101: Broken User Authentication

How attackers hack API authentication. Are you who you say you are?Photo by Markus Spiske on UnsplashYou’ve probably heard of the OWASP top ten or the top ten vulnerabilities that threaten web applications. OWASP ...

SMS authentication code includes ad: a very bad idea

We look at a recent incident where a Google SMS authentication user encountered an add attached to the code sent out. Categories: Privacy Tags: 2 factor auth2 factor authenticationadvertscarriercodesMobileprivacysms (Read more...) The ...