Blog

Blog

Discover the world of identity security, orchestration and authentication. Stay up-to-date with the latest IAM news, industry insights and emerging technologies from Transmit Security.

5 Challenges Stopping Organizations From Going Passwordless
Passwordless
5 Challenges Stopping Organizations From Going Passwordless

Everyone is aware that passwords are bad but we’re seemingly held hostage by them. They can be easily stolen and used to take over a...

Company Updates & News
Transmit Security’s Rakesh Loonkar recognized as Goldman Sachs 100 Most Intriguing Entrepreneurs

Every year, Goldman Sachs recognizes the 100 Most Intriguing Entrepreneurs at its Builders + Innovators Summit. The annual event brings together a collective of impressive...

Transmit Says “hi” to Microsoft Windows Hello
Authentication
Transmit Says “hi” to Microsoft Windows Hello

In the past few months there has been a lot of buzz about Microsoft’s Windows Hello after it was announced that Windows 10 was going...

Discovering if Microsoft Authentic is safe or not
Fraud & Risk
Is Microsoft Authenticator Safe?

Microsoft Authenticator: A False Sense of Security? As a naturally curious security professional, I am constantly trying out new security services. I decided to enable...

5 Reasons Why Service Providers Should Have Custom Authenticator Apps
Authentication
5 Reasons Why Service Providers Should Have Custom Authenticator Apps

As an application owner, you’re well aware of the need to secure access for your users. You may have thought about or even have already...

3 Reasons You Need Identity Orchestration for Your IdP (1)
Authentication
3 Reasons You Need Identity Orchestration for Your IdP

Traditional identity providers (IdPs) are essential for single sign-on (SSO) and federation for employee and customer access to resources ranging from custom-built applications to cloud-based...

10 Factors to Consider When Selecting a Remote Access Authenticator
CX
10 Factors to Consider When Selecting a Remote Access Authenticator

Now more than ever, companies have become more open to the idea of employees working remotely. For some it could be temporary but many are...

Time-Based One-Time Passwords (TOTP)
Identity Hub
Time-Based One-Time Passwords: The Good, the Bad and the Ugly

One-time passwords (OTPs) are a common method of implementing a “something you have” factor for multi-factor authentication (MFA).  These single-use codes can be implemented in...

Combat Account Takeover Attacks with MFA
Fraud & Risk
How to Combat Account Takeover Attacks with Adaptive MFA and Continuous Monitoring

Each year, institutions spend millions into protecting users from fraud attacks and scams. However, despite the amount of time and resources dedicated to identity protection,...

FIDO2 What’s the Difference Between CTAP and WebAuthN
Identity Hub
Introduction to FIDO2, CTAP, and WebAuthn

Password-based authentication is the most common form of user authentication; however, it is notoriously insecure. Passwords are commonly weak, reused, or exposed in data breaches.Other...

Integrating Identity and Risk for Real-time Threat Mitigation
Authentication
Integrating Identity and Risk for Real-time Threat Mitigation

Contributed by Eric Rogers, Regional Vice President, Sales – West This past Monday marked the beginning of my fifth week at Transmit Security. I’ve been...

5 Ways User Accounts are Breached
Fraud & Risk
5 Ways User Accounts are Breached

Account takeover is the most serious identity problem the industry is facing when it comes to user security. It has been with us since the...

1 14 15 16 17 18 19