
Identity Evolved: The Rise of Multi-Factor Verification
Identity verification has traditionally played an important but limited role in the world of identity and access management (IAM). To establish someone’s identity, you need to prove that they are who they say they are, linking their digital identity to their real-world identity. For employees, this verification typically occurs during ... Read More

Using Deterministic Security Controls To Stop Generative AI Attacks
Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals in the world. They spend their days conjuring up different ways to bypass security systems, not filling out ... Read More

HYPR: Building an Identity Security Company With a Security-First Approach
In the current digital landscape, the line that differentiates identity management from robust security is fast blurring. Many traditional identity solutions, initially designed to assist small businesses in transitioning identities to the cloud, are now buckling under the challenges posed by advanced enterprise complexities. Okta, initially conceived to simplify cloud-based ... Read More

A Closer Look at HYPR’s New Identity Assurance Solution
Earlier this month, HYPR announced our unified Identity Assurance solution, developed to secure the entire modern identity lifecycle. HYPR Identity Assurance brings together the strongest passwordless authentication, comprehensive risk assessment and enhanced identity verification to continuously detect, prevent, and eliminate identity-related risks. That’s a lot of words to describe a ... Read More

Storm-0558 Microsoft Attack and Adapt
In early July, Microsoft announced Storm-0558 where a Chinese threat actor used forged authentication tokens to access the information – primarily email accounts – of about 25 organizations. This attack included some significant organizations including the US Department of Commerce and, reportedly, the US Ambassador to China. The attack was ... Read More

Authentication in the Time of Generative-AI Attacks
There has been much excitement and buzz around generative AI in recent months. New tools pop up every hour that will undoubtedly make us humans far more efficient. At the same time, hackers have the same tools available to them and they are some of the most innovative people on ... Read More