HYPR: Building an Identity Security Company With a Security-First Approach

HYPR: Building an Identity Security Company With a Security-First Approach

In the current digital landscape, the line that differentiates identity management from robust security is fast blurring. Many traditional identity solutions, initially designed to assist small businesses in transitioning identities to the cloud, are now buckling under the challenges posed by advanced enterprise complexities. Okta, initially conceived to simplify cloud-based ... Read More
What is Identity Assurance?

A Closer Look at HYPR’s New Identity Assurance Solution

Earlier this month, HYPR announced our unified Identity Assurance solution, developed to secure the entire modern identity lifecycle. HYPR Identity Assurance brings together the strongest passwordless authentication, comprehensive risk assessment and enhanced identity verification to continuously detect, prevent, and eliminate identity-related risks. That’s a lot of words to describe a ... Read More
Storm-0558 Microsoft Attack and Adapt

Storm-0558 Microsoft Attack and Adapt

In early July, Microsoft announced Storm-0558 where a Chinese threat actor used forged authentication tokens to access the information – primarily email accounts – of about 25 organizations. This attack included some significant organizations including the US Department of Commerce and, reportedly, the US Ambassador to China. The attack was ... Read More
Authentication in the Time of Generative-AI-Strengthened Attacks

Authentication in the Time of Generative-AI-Strengthened Attacks

There has been much excitement and buzz around generative AI in recent months. New tools pop up every hour that will undoubtedly make us humans far more efficient. At the same time, hackers have the same tools available to them and they are some of the most innovative people on ... Read More
What the CISA Multi-Factor Authentication Guidance Means for Enterprises

What the CISA Multi-Factor Authentication Guidance Means for Enterprises

On October 31 2022, CISA announced critical guidance on threats against organizations using certain forms of multi-factor authentication. The agency urges all organizations to implement phishing-resistant MFA controls ASAP in order to prevent phishing and increasingly automated and sophisticated attacks on authentication processes ... Read More
What Are Push Attacks?

What Are Push Attacks?

Organizations frequently implement multi-factor authentication (2FA, MFA) that uses push notification to protect their employees and customers. The process is simple: you type in your password, receive a notification that is “pushed” to your smartphone, and approve the access. Many Identity Providers (IdPs) and MFA products work in this way ... Read More
Fixing the Way the World Logs In

Fixing the Way the World Logs In

Our digital data is the lifeblood of our modern world — all of our corporate and personal lives, how we transact business, and how we connect and care for one another. And yet we find all aspects of these digital lives becoming harder to access, and more difficult to protect ... Read More
New FFIEC Standards Recommend Passwordless MFA

New FFIEC Standards Recommend Passwordless MFA

What the New FFIEC Standards Mean for Financial Institutions On August 11, 2021, the Federal Financial Institutions Examination Council (FFIEC) issued guidance on effective authentication and access risk management practices for the various parties that access financial institution services and systems. The updated FFIEC standards and guidelines reflect the realities ... Read More
What Apple's WWDC Passkeys Announcement Means for Enterprise IAM

What Apple’s WWDC Passkeys Announcement Means for Enterprise IAM

  Apple’s WWDC 21 had a great set of new announcements around security. The most exciting one for us Identity and Access Management (IAM) geeks is the update on Apple’s commitment towards moving beyond passwords.  In this post, I wanted to share some thoughts on this great announcement and what it ... Read More

Secure Guardrails