HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)

HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)

Today Yubico announced the expansion of its YubiKey Bio Series to include multi-protocol keys that support biometric authentication for FIDO and Smart Card/PIV protocols. Like other YubiKey Bio Series, the new multi-protocol keys incorporate a fingerprint sensor, enabling secure, convenient biometric and PIN-based passwordless login across devices and platforms. The ... Read More
Report Recap: Workplace Identity Security Trends and Challenges to Watch in 2024

Report Recap: Workplace Identity Security Trends and Challenges to Watch in 2024

Identity forms the foundation of the modern workplace. Nearly every task depends on the ability to securely access systems using valid digital credentials linked to verified employees. Identity and access management (IAM) must constantly balance between security on one hand, and convenience and productivity on the other ... Read More
Analyst Perspective: Toward Converged Identity Assurance

Analyst Perspective: Toward Converged Identity Assurance

Identity and access management (IAM) is a crucial security component and a business enabler for the modern enterprise — but it’s clear that current systems are falling short on both fronts. Enterprises remain rife with legacy systems, technology silos, and manual and disconnected processes that were never intended to cope ... Read More
Best Practices for Identity Proofing in the Workplace

Best Practices for Identity Proofing in the Workplace

With employee identity risk and fraud on the rise — to the point that the FBI has issued a public warning — it’s crucial to ensure that employees are who they say they are. Is the person you interviewed the same person you actually hired? Is the person logging in ... Read More
Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

| | Authentication, passwordless
Today’s evolving and expanding threat landscape has rendered traditional security measures inadequate for safeguarding sensitive data and systems. Organizations grapple with elevated risks as malicious actors continuously devise new ways to circumvent standard security protocols and exploit vulnerabilities. Additionally, the shift towards remote and hybrid work models has brought new ... Read More
Identity Verification vs. Authentication

Identity Verification vs. Authentication

The recent, numerous high-profile attacks targeting identity processes, like those by the Lapsus$ group, underscore the need for strong identity security. New research by the Identity Defined Security Alliance found that 90% of organizations had an identity-related incident in the past year with two-thirds of those suffering direct business impact ... Read More
What Is Adaptive Authentication?

What Is Adaptive Authentication?

| | Authentication, passwordless
Authentication security remains a significant vulnerability in most organizations' security posture. Even individuals without technical expertise can easily acquire and employ pre-made hacking tools. Microsoft, for instance, fends off an astonishing 1,000 authentication attacks a second. Furthermore, the dark web is flooded with over 24 billion username and password pairs ... Read More
Meet Matt Hartley, HYPR’s CRO

Meet Matt Hartley, HYPR’s CRO

HYPR recently announced the appointment of Matt Hartley as our Chief Revenue Officer. With more than two decades in cybersecurity and technology, Matt brings invaluable expertise in sales leadership and go-to-market strategies to propel HYPR through the next stage of growth ... Read More
An Intro to PSD2 SCA Requirements

An Intro to PSD2 SCA Requirements

It’s estimated that by 2024, 74% of fraudulent card transactions worldwide will involve card-not-present (CNP) transactions. The PSD2 regulatory framework is designed to protect customers and financial institutions operating in the digital payment ecosystem from fraud, especially CNP fraud ... Read More