Company Highlights
The Benefits of a Converged Identity Credential
Many strictly regulated industries such as banking and finance rely heavily on identity and access management solutions to secure their systems and infrastructure. Unfortunately, as demonstrated by the Okta breach last year, ...
HYPR Featured Launch Partner for YubiKey Bio Multi-Protocol Edition (Early Access)
Today Yubico announced the expansion of its YubiKey Bio Series to include multi-protocol keys that support biometric authentication for FIDO and Smart Card/PIV protocols. Like other YubiKey Bio Series, the new multi-protocol ...
HYPR Engineering: The Next Generation
HYPR is expanding its original mission to take a more comprehensive approach to Identity Assurance. We have introduced two cutting-edge products, HYPR Adapt and HYPR Affirm that round out the HYPR platform ...
A Closer Look at HYPR’s New Identity Assurance Solution
Earlier this month, HYPR announced our unified Identity Assurance solution, developed to secure the entire modern identity lifecycle. HYPR Identity Assurance brings together the strongest passwordless authentication, comprehensive risk assessment and enhanced ...
Storm-0558 Microsoft Attack and Adapt
In early July, Microsoft announced Storm-0558 where a Chinese threat actor used forged authentication tokens to access the information – primarily email accounts – of about 25 organizations. This attack included some ...
Boosting Business Efficiency and Security: Insights From Forrester’s TEI Study on HYPR
In an era where digital transformation is rapidly reshaping industries, businesses face mounting challenges in safeguarding their sensitive information and ensuring user authentication is both secure and seamless.Yet they cannot afford to ...
Meet Matt Hartley, HYPR’s CRO
HYPR recently announced the appointment of Matt Hartley as our Chief Revenue Officer. With more than two decades in cybersecurity and technology, Matt brings invaluable expertise in sales leadership and go-to-market strategies ...
Vendor Tips for the SIG Questionnaire
Many companies understand the pain of constantly filling out extremely arduous customer- requested security questionnaires. Most of the time, the same common questions get asked over and over again. For some companies, ...
The Importance of Mobile Application Security Assessments in App Development
Many people assume that all applications are designed and developed with a secure-first mindset. After all, we expect things like cars, consumer products or even food to be safe for the end ...
Connection and Transformation: 2022 True Passwordless Summit Recap
One of the pleasures of the RSA Conference (now back in person!) is the quality of the conversations and getting to hear from some terrific thought leaders. We were fortunate to be ...