Blog

Blog

Discover the world of identity security, orchestration and authentication. Stay up-to-date with the latest IAM news, industry insights and emerging technologies from Transmit Security.

Fraud & Risk
Simplifying Fraud Analysis with Transmit Security

The job of a fraud analyst is not an easy one. As professionals responsible for identifying, investigating and preventing fraud, it’s crucial that they can...

vector drawing representing decisioning orchestration
Fraud & Risk
Decisioning Done Right

Whether it’s prohibiting the online sale of alcohol to underage users, challenging users from a particular geographical region in response to unusual traffic patterns in...

SIM swapping graphic
Blog
Secure Identity Verification to Prevent SIM Swapping

Think of the breadth of information stored on your phone and the activities that could be performed simply by unlocking it. With complete control over...

Blog
The Rise of Account Fraud in the Wake of the SVB and Signature Bank Collapse & How to Stop It 

In the wake of the Silicon Valley Bank (SVB) and Signature Bank collapse, there was an immediate scramble to move money. Businesses and individuals rushed...

Fraud & Risk
How to Protect Your Users from Xenomorph

A new Android banking trojan called Xenomorph is gaining popularity among threat actors who are using the malware to steal credentials from over 450 apps,...

Fraud & Risk
Leading US Bank Achieves 1300% ROI with Transmit Security

When a multi-billion dollar US bank learned of a large-scale fraud campaign that had evaded detection by their current fraud detection tools, they quickly turned...

Blog
Here’s How Switching from Push to Passwordless Revitalized a French Finance App

As former accountants, the founders of Regate, a French business-to-business finance and accounting application, set out to create a service that would make life easier...

Fraud & Risk
Protecting Customer Personal Data in the Digital Age

As more and more business is conducted online, customers are entrusting businesses with greater amounts of their personal data — making data security increasingly important...

Blog
How to Fortify Microsoft Azure AD B2C with True Passwordless MFA from Transmit Security

We are all too familiar with the problems of passwords. New data from Microsoft provides a unique perspective on the state of cybersecurity based on...

Fraud & Risk
Simulate, Explore and Remediate Attacks with Transmit Security

With many cyberattacks and fraud campaigns today, the threats detected by risk and fraud teams are often only the tip of the iceberg. Most risk...

icons representing ID proofing and data validation
CX
Secure Account Opening with Passive Validation

In both real life and in online business, first impressions count. With steep competition for new users, providing a frictionless experience during the first moments...

Blog
OpenBullet 2.0 Automates Evasive Attacks, But They Can Be Detected — Here’s How

OpenBullet, a legitimate web testing tool for developers, has grown wildly popular among hackers. Weaponizing open-source software is not new, but this one has cybersecurity ...

1 3 4 5 6 7 19