How to Detect Social Engineering Account Takeovers 

How to Detect Social Engineering Account Takeovers  - Transmit Blog Header Image 1258x826 template3

Account takeovers (ATOs) resulting from social engineering are commonplace. This is likely because they’re easy to execute even for novice fraudsters. Sprawling communities of scammers gather to share successful methods, sell credentials and provide money mule services to each other. According to Javelin Research’s annual “Identity Fraud Study: The Virtual Battleground” report, account takeover increased […]

How to Migrate From Gigya to Transmit Security

How to Migrate From Gigya to Transmit Security - Transmit Blog Header Image 1258x826 Gigya takedown 1

What is Gigya? Before being acquired by SAP in 2017, Gigya was a software company providing access and user data management solutions, mainly in the CRM (Customer Relationship Management) space. Its key benefits were analytics, third-party integrations with marketing and services platforms, and user preference management. SAP integrated Gigya’s capabilities into its existing customer data […]

Passkeys: Why They Matter and How to Use Them

Passkeys: Why They Matter and How to Use Them - Transmit Blog Header Image 1258x826 intro to passkeys

An Introduction to Passkeys: Why They Matter and How to Use Them The cybersecurity world is buzzing with the news about Apple’s passkeys. An accessible way of going passwordless is a welcome change – even if it’s limited to just certain devices for now. With Google’s recent announcement that it supports passkeys on Chrome and […]

Twilio Phishing Attack Exposes Weaknesses of SMS

Twilio Phishing Attack Exposes Weaknesses of SMS - Transmit Blog Header Image 1258x826 template3

Twilio, a telecom giant with more than 150,000 corporate customers, reported that a targeted phishing campaign successfully allowed hackers to access some of their customer data. On August 4, a well-organized attacker used stolen corporate login credentials to access the data of 125 corporate customers, Twilio explained in a blog article describing the incident.   […]

One Year Later, and I’m Still on Board with Our Passwordless Mission

CIAM biggest issues

It has been one year since I joined Transmit Security. To be totally transparent, it’s a bit of a blur given the state of the world over these last few years. Like many, I’ve suffered from “pandemic brain” — that twilight dimension where time loses meaning due to an acute overdose of takeout and true […]

Magic link authentication

Magic link authentication - Cover inside article 2318301745 SEO Magic link authentication

Applications give customers the user experiences they want, like shopping online or accessing healthcare records. While developers focus on the security of the application, users bear the burden of securing their access to the application. Unfortunately, cybercriminals recognize that user access can be a weak link in an application’s security posture. Increasingly, malicious actors target […]

What is Chargeback Management?

What is Chargeback Management? - 2318301832 SEO Chargeback

Every merchant or organization that sells a good or service will experience a chargeback. Since they can cost the merchant up to three times the cost of the transaction, they must have an effective process in place to deal with them. This article will discuss some of the issues related to chargebacks and present a […]

Invisible Security

Invisible Security - 2318301818 SEO Invisible

As organizations across industries have embraced digital transformation, the opportunity for cyberattacks has increased exponentially. Despite the need for assurance that their technology is secure, most users lack the skills, time, and resources to dedicate themselves to cybersecurity. In contrast with usable security, which looks to educate the user on which actions to take to […]