Blog

Blog

Discover the world of identity security, orchestration and authentication. Stay up-to-date with the latest IAM news, industry insights and emerging technologies from Transmit Security.

Vendor Consolidation
How to Consolidate Identity Vendors for Effective Cybersecurity

As cyber threats such as account takeover, new account fraud and credential-based attacks continue to increase, companies must be proactive in consolidating their identity and...

Fraud & Risk
Top 2023 Cybersecurity Trends for Strengthening CIAM

When it comes to cybersecurity, it’s not a matter of whether you’ll be targeted, but rather when and how. Simply being a target is now...

Blog
Webinar: Is It Time to Panic? Attackers Are Leveraging ChatGPT – But Security Can Too

With a carefully worded prompt, it’s possible to trick ChatGPT to write malicious code or pinpoint vulnerabilities in code you provide. So is it time...

Vendor Consolidation
Simplify and Strengthen Identity Security with Vendor Consolidation

When it comes to identity security, the stakes are high. A single data breach can result in significant financial losses, regulatory fines, and damage to...

Fraud & Risk
Detection and Response with iOS and Android SDKs

With the increased usage of mobile devices for sensitive transactions, including banking and working, the threat of mobile device fraud has grown significantly, requiring the...

Passwordless
What Does Google’s Passkeys Rollout Mean for Your Business?

Efforts to phase out passwords gained a burst of momentum this week as Google rolled out passkeys, a secure and frictionless form of password-free login...

Fraud & Risk
Securing Mobile Devices with Mobile Native Detection

As mobile app usage continues to increase, so does the potential for fraud. Fraudsters are finding new ways to exploit vulnerabilities in mobile devices that...

Authentication
Securing the User Lifecycle for Passkeys With Transmit Security

In the face of increased data breaches and account takeover attacks, there is a growing need for authentication methods that guard against phishing, credential stuffing,...

Fraud & Risk
Combat Fraud with Mobile Emulator Detection

A mobile emulator is software that mimics the hardware and software functionalities of smartphones. Although they have legitimate uses, such as developing and testing mobile...

Fraud & Risk
Solving AI’s Black-Box Problem with Explainable AI and SHAP Values

One of the key challenges in fraud detection today is the black box nature of AI-powered detection services. Designed to help teams quickly detect complex...

Blog
How Will Generative AI Reshape European Privacy Regulations?

The development of generative AI models, such as OpenAI’s GPT series, has opened up new avenues of innovation, offering numerous applications in various industries. However,...

Fraud & Risk
Protecting Customers from Device Takeover Attacks

Whether it’s preventing friction that can lead to customer dropoffs, strengthening authentication through the use of two-factor authentication or securing remote workers, the ability to...

1 2 3 4 5 18