What’s the State of Identity Assurance Today? Recap of the 2024 Report

What’s the State of Identity Assurance Today? Recap of the 2024 Report

Identity security is at a crossroads. As digital transformation accelerates, organizations are increasingly vulnerable to identity-focused attacks, which are now the primary entry point for cybercriminals. The incorporation of artificial intelligence (AI) into the attacker’s arsenal ups the stakes even higher. Cybercriminals recently stole $25 million from a multinational finance ... Read More
HYPR Featured Partner for YubiKey Bio Multi-Protocol Edition

HYPR Featured Partner for YubiKey Bio Multi-Protocol Edition

Today Yubico announced the general availability of its YubiKey Bio - Multi-protocol Edition, which supports biometric authentication for FIDO and Smart Card/PIV protocols. Like other YubiKey Bio Series, the new multi-protocol keys incorporate a fingerprint sensor, enabling secure, convenient biometric and PIN-based passwordless login across devices and platforms. The multi-protocol ... Read More
Report Recap: Workplace Identity Security Trends in 2024

Report Recap: Workplace Identity Security Trends in 2024

Identity forms the foundation of the modern workplace. Nearly every task depends on the ability to securely access systems using valid digital credentials linked to verified employees. Identity and access management (IAM) must constantly balance between security on one hand, and convenience and productivity on the other ... Read More
Analyst Perspective: Toward Converged Identity Assurance

Analyst Perspective: Toward Converged Identity Assurance

Identity and access management (IAM) is a crucial security component and a business enabler for the modern enterprise — but it’s clear that current systems are falling short on both fronts. Enterprises remain rife with legacy systems, technology silos, and manual and disconnected processes that were never intended to cope ... Read More
Why Risk-Based Authentication is Essential for Zero Trust

Why Risk-Based Authentication is Essential for Zero Trust

| | Authentication, passwordless
Today’s evolving and expanding threat landscape has rendered traditional security measures inadequate for safeguarding sensitive data and systems. Organizations grapple with elevated risks as malicious actors continuously devise new ways to circumvent standard security protocols and exploit vulnerabilities. Additionally, the shift towards remote and hybrid work models has brought new ... Read More
Identity Verification vs. Authentication

Identity Verification vs. Authentication

The recent, numerous high-profile attacks targeting identity processes, like those by the Lapsus$ group, underscore the need for strong identity security. New research by the Identity Defined Security Alliance found that 90% of organizations had an identity-related incident in the past year with two-thirds of those suffering direct business impact ... Read More
What Is Adaptive Authentication?

What Is Adaptive Authentication?

| | Authentication, passwordless
Authentication security remains a significant vulnerability in most organizations' security posture. Even individuals without technical expertise can easily acquire and employ pre-made hacking tools. Microsoft, for instance, fends off an astonishing 1,000 authentication attacks a second. Furthermore, the dark web is flooded with over 24 billion username and password pairs ... Read More
An Intro to PSD2 SCA Requirements

An Intro to PSD2 SCA Requirements

It’s estimated that by 2024, 74% of fraudulent card transactions worldwide will involve card-not-present (CNP) transactions. The PSD2 regulatory framework is designed to protect customers and financial institutions operating in the digital payment ecosystem from fraud, especially CNP fraud ... Read More
Are You Ready for the FTC MFA Requirements?

Are You Ready for the FTC MFA Requirements?

What Are the FTC MFA Requirements?  In October 2021, the FTC announced that it was updating the Safeguards Rule. The Safeguards Rule took effect in 2003 as part of the Gramm-Leach-Bliley Act (GLBA) and aims to protect U.S.-based consumers from data breaches, cyberattacks and their resultant effects, such as fraud ... Read More