Identity Evolved: The Rise of Multi-Factor Verification

Identity Evolved: The Rise of Multi-Factor Verification

Identity verification has traditionally played an important but limited role in the world of identity and access management (IAM). To establish someone’s identity, you need to prove that they are who they say they are, linking  their digital identity to their real-world identity. For employees, this verification typically occurs during ... Read More
Using Deterministic Security Controls To Stop Generative AI Attacks

Using Deterministic Security Controls To Stop Generative AI Attacks

Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals in the world. They spend their days conjuring up different ways to bypass security systems, not filling out ... Read More
HYPR: Building an Identity Security Company With a Security-First Approach

HYPR: Building an Identity Security Company With a Security-First Approach

In the current digital landscape, the line that differentiates identity management from robust security is fast blurring. Many traditional identity solutions, initially designed to assist small businesses in transitioning identities to the cloud, are now buckling under the challenges posed by advanced enterprise complexities. Okta, initially conceived to simplify cloud-based ... Read More
What is Identity Assurance?

A Closer Look at HYPR’s New Identity Assurance Solution

Earlier this month, HYPR announced our unified Identity Assurance solution, developed to secure the entire modern identity lifecycle. HYPR Identity Assurance brings together the strongest passwordless authentication, comprehensive risk assessment and enhanced identity verification to continuously detect, prevent, and eliminate identity-related risks. That’s a lot of words to describe a ... Read More
Storm-0558 Microsoft Attack and Adapt

Storm-0558 Microsoft Attack and Adapt

In early July, Microsoft announced Storm-0558 where a Chinese threat actor used forged authentication tokens to access the information – primarily email accounts – of about 25 organizations. This attack included some significant organizations including the US Department of Commerce and, reportedly, the US Ambassador to China. The attack was ... Read More
Authentication in the Time of Generative-AI Attacks

Authentication in the Time of Generative-AI Attacks

There has been much excitement and buzz around generative AI in recent months. New tools pop up every hour that will undoubtedly make us humans far more efficient. At the same time, hackers have the same tools available to them and they are some of the most innovative people on ... Read More