Author: Alex Brown
A self-professed technology geek, content writer Alex Brown is the kind of person who actually reads the manual that comes with his smartphone from cover to cover. His experience evangelizing for the latest and greatest tech solutions gives him an energized perspective on the latest trends in the authentication industry. Alex most recently led the content team at Boston-based tech company Form.com.
3 Reasons You Need Identity Orchestration for Your IdP

Traditional identity providers (IdPs) are essential for single sign-on (SSO) and federation for employee and customer access to resources ranging from custom-built applications to cloud-based services. By themselves, they are great at doing these tasks, however there are trade-offs that need to be considered. Here we look at the top 3. Increased Convenience Comes With […]
10 Factors to Consider When Selecting a Remote Access Authenticator

Now more than ever, companies have become more open to the idea of employees working remotely. For some it could be temporary but many are adopting it as a permanent option going forward. The benefits of remote work are almost endless for both employees and employers. It allows for a better work-life balance which ultimately […]
Time-Based One-Time Passwords: The Good, the Bad and the Ugly

One-time passwords (OTPs) are a common method of implementing a “something you have” factor for multi-factor authentication (MFA). These single-use codes can be implemented in a few different ways with varying levels of security. What does OTP mean? OTP stands for one-time password. OTPs are commonly used in multi-factor authentication (MFA) schemes to prove ownership […]
How to Combat Account Takeover Attacks with Adaptive MFA and Continuous Monitoring

Each year, institutions spend millions into protecting users from fraud attacks and scams. However, despite the amount of time and resources dedicated to identity protection, fraud attacks are steadily on the rise. Continuing on from our previous post, where we covered the “5 Top Ways User Accounts are Breached”, this week’s post we’ll discuss 5 […]
Introduction to FIDO2, CTAP, and WebAuthn

Password-based authentication is the most common form of user authentication; however, it is notoriously insecure. Passwords are commonly weak, reused, or exposed in data breaches.Other forms of authentication provide stronger security. For example, a physical token like a Yubikey or Google Titan is much more difficult to steal or copy. The main advantage of a […]
Integrating Identity and Risk for Real-time Threat Mitigation

Contributed by Eric Rogers, Regional Vice President, Sales – West This past Monday marked the beginning of my fifth week at Transmit Security. I’ve been lucky to have had the opportunity to be part of some incredible companies that were later acquired for their unique solutions that solved problems that no one else was addressing. […]
5 Ways User Accounts are Breached

Account takeover is the most serious identity problem the industry is facing when it comes to user security. It has been with us since the early days of online services and is only getting worse. So what exactly happens once an account is hacked? An account or credentials that are breached leads to an increased […]
5 Authentication Technologies to Know and Implement

Five or six years ago authentication was mostly passwords. Fast forward to today and we’re seeing more authentication options and technologies across the board. The FIDO Alliance has seen tremendous global growth with over 680 certified products in 2019 including top consumer brands and nearly every biometric vendor. There are many authentication options in the […]
The Tech-Road Ahead: 2020 Trends Require a Radical Rethinking of IAM

Gartner released the Top Tech-Trends for 2020 at its recent CIO Conference in Barcelona. Interestingly, all of the trends Gartner identified will require drastically increased agility and flexibility for Identity and Access Management (IAM) solutions. Static, binary authentication is no longer sufficient, including multi-factor authentication (MFA) methods. Going forward, dynamic continuous authentication is the only […]