
What’s the State of Identity Assurance Today? Recap of the 2024 Report
Identity security is at a crossroads. As digital transformation accelerates, organizations are increasingly vulnerable to identity-focused attacks, which are now the primary entry point for cybercriminals. The incorporation of artificial intelligence (AI) into the attacker’s arsenal ups the stakes even higher. Cybercriminals recently stole $25 million from a multinational finance ... Read More

HYPR Featured Partner for YubiKey Bio Multi-Protocol Edition
Today Yubico announced the general availability of its YubiKey Bio - Multi-protocol Edition, which supports biometric authentication for FIDO and Smart Card/PIV protocols. Like other YubiKey Bio Series, the new multi-protocol keys incorporate a fingerprint sensor, enabling secure, convenient biometric and PIN-based passwordless login across devices and platforms. The multi-protocol ... Read More

Report Recap: Workplace Identity Security Trends in 2024
Identity forms the foundation of the modern workplace. Nearly every task depends on the ability to securely access systems using valid digital credentials linked to verified employees. Identity and access management (IAM) must constantly balance between security on one hand, and convenience and productivity on the other ... Read More

Analyst Perspective: Toward Converged Identity Assurance
Identity and access management (IAM) is a crucial security component and a business enabler for the modern enterprise — but it’s clear that current systems are falling short on both fronts. Enterprises remain rife with legacy systems, technology silos, and manual and disconnected processes that were never intended to cope ... Read More

Why Risk-Based Authentication is Essential for Zero Trust
Today’s evolving and expanding threat landscape has rendered traditional security measures inadequate for safeguarding sensitive data and systems. Organizations grapple with elevated risks as malicious actors continuously devise new ways to circumvent standard security protocols and exploit vulnerabilities. Additionally, the shift towards remote and hybrid work models has brought new ... Read More

Identity Verification vs. Authentication
The recent, numerous high-profile attacks targeting identity processes, like those by the Lapsus$ group, underscore the need for strong identity security. New research by the Identity Defined Security Alliance found that 90% of organizations had an identity-related incident in the past year with two-thirds of those suffering direct business impact ... Read More

What Is Adaptive Authentication?
Authentication security remains a significant vulnerability in most organizations' security posture. Even individuals without technical expertise can easily acquire and employ pre-made hacking tools. Microsoft, for instance, fends off an astonishing 1,000 authentication attacks a second. Furthermore, the dark web is flooded with over 24 billion username and password pairs ... Read More

An Intro to PSD2 SCA Requirements
It’s estimated that by 2024, 74% of fraudulent card transactions worldwide will involve card-not-present (CNP) transactions. The PSD2 regulatory framework is designed to protect customers and financial institutions operating in the digital payment ecosystem from fraud, especially CNP fraud ... Read More

Are You Ready for the FTC MFA Requirements?
What Are the FTC MFA Requirements? In October 2021, the FTC announced that it was updating the Safeguards Rule. The Safeguards Rule took effect in 2003 as part of the Gramm-Leach-Bliley Act (GLBA) and aims to protect U.S.-based consumers from data breaches, cyberattacks and their resultant effects, such as fraud ... Read More