Best Practices for Identity Proofing in the Workplace

Best Practices for Identity Proofing in the Workplace

With employee identity risk and fraud on the rise — to the point that the FBI has issued a public warning — it’s crucial to ensure that employees are who they say they are. Is the person you interviewed the same person you actually hired? Is the person logging in ... Read More
Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

| | Authentication, passwordless
Today’s evolving and expanding threat landscape has rendered traditional security measures inadequate for safeguarding sensitive data and systems. Organizations grapple with elevated risks as malicious actors continuously devise new ways to circumvent standard security protocols and exploit vulnerabilities. Additionally, the shift towards remote and hybrid work models has brought new ... Read More
Identity Verification vs. Authentication

Identity Verification vs. Authentication

The recent, numerous high-profile attacks targeting identity processes, like those by the Lapsus$ group, underscore the need for strong identity security. New research by the Identity Defined Security Alliance found that 90% of organizations had an identity-related incident in the past year with two-thirds of those suffering direct business impact ... Read More
What Is Adaptive Authentication?

What Is Adaptive Authentication?

| | Authentication, passwordless
Authentication security remains a significant vulnerability in most organizations' security posture. Even individuals without technical expertise can easily acquire and employ pre-made hacking tools. Microsoft, for instance, fends off an astonishing 1,000 authentication attacks a second. Furthermore, the dark web is flooded with over 24 billion username and password pairs ... Read More
Meet Matt Hartley, HYPR’s CRO

Meet Matt Hartley, HYPR’s CRO

HYPR recently announced the appointment of Matt Hartley as our Chief Revenue Officer. With more than two decades in cybersecurity and technology, Matt brings invaluable expertise in sales leadership and go-to-market strategies to propel HYPR through the next stage of growth ... Read More
An Intro to PSD2 SCA Requirements

An Intro to PSD2 SCA Requirements

It’s estimated that by 2024, 74% of fraudulent card transactions worldwide will involve card-not-present (CNP) transactions. The PSD2 regulatory framework is designed to protect customers and financial institutions operating in the digital payment ecosystem from fraud, especially CNP fraud ... Read More
Are You Ready for the FTC MFA Requirements?

Are You Ready for the FTC MFA Requirements?

What Are the FTC MFA Requirements?  In October 2021, the FTC announced that it was updating the Safeguards Rule. The Safeguards Rule took effect in 2003 as part of the Gramm-Leach-Bliley Act (GLBA) and aims to protect U.S.-based consumers from data breaches, cyberattacks and their resultant effects, such as fraud ... Read More
Identification vs. Authentication: What’s the Difference?

Identification vs. Authentication: What’s the Difference?

| | Authentication
In discussions of identity and access management (IAM), you sometimes find terms used interchangeably, when they actually describe very different processes. While this may not matter in casual conversation, recognizing and solving security issues relies on effective labeling. One of the most common of these mislabeled processes is when people ... Read More
Top 12 Financial Services Cybersecurity Regulations to Know in 2023

Top 12 Financial Services Cybersecurity Regulations to Know in 2023

Financial services are one of the most targeted industries in the world for cyberattacks, suffering nearly 20% of all attacks in 2022. This is understandable considering the high-value outcomes of successful attacks and the fact that, despite supposed security improvements, attacks are still relatively successful, with over eight million records ... Read More
Loading...

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)