The Ultimate guide to WebAuthn registration and auth flows

In March 2019, the World Wide Web Consortium (W3C) announced that WebAuthn is now the official web standard for password-free login. With support from a broad set of applications (Microsoft Edge, Chrome, Firefox, Mobile), widespread adoption of WebAuthn is expected in coming years. In previous blog posts we went through how WebAuthn can benefit…

3 Things You Can Do to Prevent Account Takeovers

As you likely know, 2018 was not a good year for data security. In the first half of the year, there was a 133% increase in compromised company records compared to the first half of 2017, and an average of 291 records stolen every second. Unfortunately, just a few months in, 2019 has already seen a number of big name corporation data breaches…

The Ultimate Guide to FIDO2 and WebAuthn Terminology

In March 2019, the World Wide Web Consortium (W3C) announced that WebAuthn is now the official web standard for password-free login. With support from a broad set of applications (Microsoft Edge, Chrome, Firefox, Mobile), widespread adoption of WebAuthn is expected in coming years. In a previous blog post we went through some examples of how…

What is Credential Stuffing?

Malware often gets top billing in mainstream news reporting of cyber-threats. It makes for snappy headlines and a compelling narrative—–but it’s not the whole story. Increasingly, organizations are finding customers exposed to malware-free account takeover attacks, which could result in serious data theft. There are several ways hackers can…

Why Fintech Firms Need Cloud-Powered Identity Management to Grow

The UK’s fintech sector is a global success story, generating an estimated 60,000 jobs and contributing $7 billion annually to the economy. Thousands of start-ups are offering innovative solutions to common challenges, using new technologies and processes to succeed in what is already a highly competitive space. But in the quest for cloud and…

Supporting the UK’s Ambitious Government Transformation Strategy

All over the world, governments are developing ambitious digital transformation strategies to provide better public services more efficiently and cost effectively. The UK government is no exception. In fact, it’s Government Transformation Strategy is one of the most far-reaching projects of its kind, aiming to use a £450m budget to save £3.5bn by…

Build vs. Buy: The Value of MFA Implementation Through APIs and SDKs

Developers need to make their cloud-native applications secure, which can demand a lot of resources and take their focus off the core functionality of an app. But building security into an app doesn’t need to be challenging or time-consuming. Leveraging APIs and SDKs means developers can strengthen an app while actually reducing their workload. By…

Mitigate Risks with Modern Password Recovery Systems

The ability to reset your password is an essential system requirement. With so many online services available, it’s common to have multiple user accounts for the various apps and services you interact with every day. Security doctrine dictates that you need a different password for each account, and that you update each one regularly. With so many…

Taking a Risk-Based Approach to Biometrics

Biometric authentication — using the unique biological characteristics of an individual to verify their identity — has been around since the dawn of humankind. Think about it: humans use facial and voice recognition every day to identify each other. Signature recognition came about when the first contracts were originally created, and fingerprints…

Use Behavior and Context to Secure Access

The traditional perimeter which protected IT assets on the corporate network has become irrelevant. The proliferation of cloud-based services, such as email and online file sharing, being used to augment conventional inhouse IT systems, and the rise of mobility where remote access from anywhere is required by your employees, partners and even…