Author: Alex Brown
A self-professed technology geek, content writer Alex Brown is the kind of person who actually reads the manual that comes with his smartphone from cover to cover. His experience evangelizing for the latest and greatest tech solutions gives him an energized perspective on the latest trends in the authentication industry. Alex most recently led the content team at Boston-based tech company Form.com.
FIDO2: What Every C-Level Needs to Know & Why Your Business Needs It

Fast identity online (FIDO2) isn’t just about improving your own cybersecurity efforts. It’s a calculated approach that also improves your users’ experiences and reduces friction while navigating their online accounts with you — whether those users are your employees or your end customers. In this article, we’ll cover three core reasons why adopting FIDO2 protocols […]
Why SMS Two Factor Authentication Isn’t Enough. And What You Should Use Instead

One-time passwords sent via SMS aren’t a reliable indicator of identity. And, as it turns out, they never really were in the first place. Because while OTPs are a step-up from knowledge-based questions and passwords alone, the way they’re delivered opens them up to numerous vulnerabilities. Which leaves us with the burning question: if not […]
A Guide To PSD2 & SCA and How It Will Affect Your Business

If you’re in charge of compliance or mitigating potential fraud in your organization, you need to be up-to-date with what’s been happening over in the European Union. And with good reason! The European Union’s recent Payment Services Directive (PSD2) is a groundbreaking development that is now steadily being enforced throughout Europe. Building off the original […]
Deploying FIDO 2.0: User Interaction Models and Implementation Challenges

Our reliance on online services is ever-increasing. These services are affecting us nowadays more than ever: they are conduits to our social interactions, finances, general conduct and well-being. In any given minute Amazon ships out 6659 packages, Zoom hosts 208,333 meetings, Venmo users send $239,196 and Doordash delivers 555 meals (World Economic Forum). Controls that […]
Identity Portability: Is This the End of Usability vs. Security?

The traditional trade-off between authentication usability and security has finally ended. Who would have thought? For years we were taught to believe that when it comes to authentication there is a clear divide between the two – usability vs. security. If you were in search of strong authentication that would usually come at the cost […]
5 Challenges Stopping Organizations From Going Passwordless

Everyone is aware that passwords are bad but we’re seemingly held hostage by them. They can be easily stolen and used to take over a user’s account. They’re inconvenient as people tend to forget them, write them on notes, and often reuse them across all different systems and services making the security problems even worse. […]
Transmit Says “hi” to Microsoft Windows Hello

In the past few months there has been a lot of buzz about Microsoft’s Windows Hello after it was announced that Windows 10 was going passwordless…well, almost passwordless. We here at Transmit are excited over Hello as another tool that brings us one step closer to getting rid of passwords once and for all. You’d […]
Is Microsoft Authenticator Safe?

Microsoft Authenticator: A False Sense of Security? As a naturally curious security professional, I am constantly trying out new security services. I decided to enable the Microsoft Authenticator on my personal Microsoft account. Microsoft describes their Authenticator as “More secure. Passwords can be forgotten, stolen, or compromised. With Authenticator, your phone provides an extra layer […]
5 Reasons Why Service Providers Should Have Custom Authenticator Apps

As an application owner, you’re well aware of the need to secure access for your users. You may have thought about or even have already implemented an authenticator app from Google or Microsoft to help ensure those that have access to your applications are legitimate users. An authenticator app uses tools such as push notifications, […]