Author: Alex Brown
A self-professed technology geek, content writer Alex Brown is the kind of person who actually reads the manual that comes with his smartphone from cover to cover. His experience evangelizing for the latest and greatest tech solutions gives him an energized perspective on the latest trends in the authentication industry. Alex most recently led the content team at Boston-based tech company Form.com.
How to Detect Social Engineering Account Takeovers

Account takeovers (ATOs) resulting from social engineering are commonplace. This is likely because they’re easy to execute even for novice fraudsters. Sprawling communities of scammers gather to share successful methods, sell credentials and provide money mule services to each other. According to Javelin Research’s annual “Identity Fraud Study: The Virtual Battleground” report, account takeover increased […]
How to Migrate From Gigya to Transmit Security

What is Gigya? Before being acquired by SAP in 2017, Gigya was a software company providing access and user data management solutions, mainly in the CRM (Customer Relationship Management) space. Its key benefits were analytics, third-party integrations with marketing and services platforms, and user preference management. SAP integrated Gigya’s capabilities into its existing customer data […]
Passkeys: Why They Matter and How to Use Them

An Introduction to Passkeys: Why They Matter and How to Use Them The cybersecurity world is buzzing with the news about Apple’s passkeys. An accessible way of going passwordless is a welcome change – even if it’s limited to just certain devices for now. With Google’s recent announcement that it supports passkeys on Chrome and […]
Consolidating Security With a Multipersona Platform: Mickey Boodaei’s Map to Modern Identity

Transmit Security co-founder and CEO Mickey Boodaei is on a mission to solve the identity problem. He believes organizations are waking up to identity at the root of all their account protection challenges. Once you solve the problem, he says, “You’ll have the best security and customer experience. You’ll move with the market.” As […]
Twilio Phishing Attack Exposes Weaknesses of SMS

Twilio, a telecom giant with more than 150,000 corporate customers, reported that a targeted phishing campaign successfully allowed hackers to access some of their customer data. On August 4, a well-organized attacker used stolen corporate login credentials to access the data of 125 corporate customers, Twilio explained in a blog article describing the incident. […]
One Year Later, and I’m Still on Board with Our Passwordless Mission

It has been one year since I joined Transmit Security. To be totally transparent, it’s a bit of a blur given the state of the world over these last few years. Like many, I’ve suffered from “pandemic brain” — that twilight dimension where time loses meaning due to an acute overdose of takeout and true […]
Magic link authentication

Applications give customers the user experiences they want, like shopping online or accessing healthcare records. While developers focus on the security of the application, users bear the burden of securing their access to the application. Unfortunately, cybercriminals recognize that user access can be a weak link in an application’s security posture. Increasingly, malicious actors target […]
What is Chargeback Management?

Every merchant or organization that sells a good or service will experience a chargeback. Since they can cost the merchant up to three times the cost of the transaction, they must have an effective process in place to deal with them. This article will discuss some of the issues related to chargebacks and present a […]
Invisible Security

As organizations across industries have embraced digital transformation, the opportunity for cyberattacks has increased exponentially. Despite the need for assurance that their technology is secure, most users lack the skills, time, and resources to dedicate themselves to cybersecurity. In contrast with usable security, which looks to educate the user on which actions to take to […]