
Blog


Working from home call center equipment to ensure customer data security
From laptops to headphones, call center employees working remotely require the right equipment to be successful. But working from home presents an even bigger challenge: sensitive customer data is now spread across thousands of company laptops — so knowing who is accessing your company’s devices at all times becomes increasingly important. Below, we explore why…
Expert Insights Awards TypingDNA Best of Zero Trust Solutions, Plus 2 More Cybersecurity Categories
On April 12th, 2022, Expert Insights announced their “Best Of” Cybersecurity awards — declaring TypingDNA as the winner across 3 major categories. Expert Insights declared TypingDNA as the winner across 3 cybersecurity categories: Best of Zero Trust Security (ActiveLock) Best of Multi-Factor Authentication (Verify 2FA) Best of Biometric Authentication (ActiveLock and Verify 2FA) Expert Insights…
HIPAA compliance checklist for remote employees in 2022
With rising cyber threats and more people working from home, securing endpoint devices has never been more critical. In the healthcare industry, the Health Insurance Portability and Accountability Act (HIPAA) protects private and sensitive patient data by requiring organizations handling healthcare information to pay closer attention to their protocols and institute airtight security safeguards. Hospitals,…
Cybersecurity Executive Order 14028: What You Need to Know for 2022
In May of 2021, the Biden administration took a big step toward modernizing the cyber defense of the United States. As a response to the growing number of high profile security breaches, President Biden signed Cybersecurity Executive Order 14028 “Improving the Nation’s Cybersecurity” — with the goal of protecting federal networks from cyber threats. It…
If Using Facial Recognition Software for Workforce Authentication, STOP
When the pandemic forced millions of employees to suddenly work from home, it came at a huge cost to company security — leaving IT security teams unprepared to scale their data security responsibilities. To protect their companies, some turned to stricter protocols to better monitor internal threats, including verifying employee identities with facial recognition software….
Enhancing next-generation security with continuous authentication: XDR explained
As cyber threats have evolved, so has the security landscape — with incredible resources being allocated to protect company assets and keep bad actors at bay. Endpoint security today has seen a transition from endpoint detection and response (EDR) to extended detection and response (XDR), which pushes the capabilities of EDR and offers holistic protection for endpoints, networks, and enterprise workloads.
How the BPO Industry Safeguards Data When Employees Work Remotely
Prior to 2020, many in the BPO industry had never even considered working from home. In fact, most BPO companies historically operated out of an office with dedicated equipment and established security practices. But the pandemic changed all that, and now nearly 66% of employees say they’re not going back. With sensitive client data no…
Complementing endpoint security with continuous authentication
Recent digital transformation initiatives across businesses and remote work environments have further contributed to an even more important role of endpoint security software. In this article, we explore the addition of continuous authentication as a complementary solution for enhanced security.
TypingDNA launches ActiveLock, a continuous authentication solution to prevent unauthorized use of company computers
We are thrilled to introduce TypingDNA ActiveLock, a typing biometrics-based continuous authentication technology that prevents unauthorized users from accessing company equipment and offers real-time biometric-level security without impacting the employee experience.
Top cyber threats in 2021 – human error exploited, insider threats, and Ransomware as a Service
Cyber threats in 2021 have exceeded the total for 2020 costing companies worldwide an estimated $10.5 trillion. Alarming is also their increased sophistication, making the security industry one of the most fast-paced and versatile this year.
Zero Trust Architecture: Learn the Basics & How to Build Your Defense
To understand zero trust architecture, you must rethink your mindset of cyber security. For years, security teams were guided by a simple code: “Trust, but verify.“ But with zero trust, security is far less laid back — guided by a more skeptical philosophy of “Never trust. Always verify.” In this article, we’ll walk you through…
DMV course providers can now use typing biometrics to validate student identities
In an announcement made public in October of this year, the NY DMV is now allowing students to take a 5 Hours Prelicensing Course to replace the Driver Education course (consisting of 24 hours of classroom instruction and 24 hours of in-car instruction) to take their road test and get their driver license.
User-friendly, typing biometrics-based alternative to TOTP authentication
TOTP was first introduced by RSA Security and was exclusively sold under patent. Once the patent expired, TOTP gained momentum and was adopted on a large scale as 2FA became more popular.
What Is Multi Factor Authentication (MFA) and Why Passwords Are Not Enough
With cyber breaches making headlines seemingly every week, one thing is clear — passwords alone are no longer enough to keep us safe. While stopping all online crime is not a realistic goal, Multi Factor Authentication (MFA) is a simple but critical step in your security flow that can massively reduce the likelihood you or your…
Continuous authentication: how it works and what you need to know about use cases and industries
What is continuous authentication? Continuous authentication relies on analyzing multiple data points linked to a unique user. This data can include browser activity, mouse characteristics, mobile sensors, and even behavioral biometrics. The data points are continuously monitored to identify changes in behavior, confirming or blocking a user’s access to corporate assets or programs. Any changes…
Best Alternative to Twilio Authy based on price and UX
Twilio Authy is one of the most popular solutions for two-factor authentication. But just because something is popular doesn’t mean it’s without flaws. In particular, Twilio Authy has quite a few common pain points ranging from high prices to difficult user experiences. So if you’re on the search for the best alternative to Twilio Authy,…
How to improve your OTP authentication using typing biometrics
This article will highlight three implementation forms of OTP authentication and present a valid alternative or coupling method that provides increased security without harming the user experience.
Cheat Sheet: How to Choose the Right 2FA for Your Website
With the next cyber breach around the corner, having 2FA on your website is a no brainer. But which two-factor solution is right for you? There’s plenty to consider in making the right decision. Do you need high security or more convenience? Do you want a balance of both? With this 2FA guide, we’ll help…
How to secure remote access for employees working from home
How do you maintain secure remote access when employees work remotely? That was the million dollar question even before the COVID-19 pandemic forced millions of employees to transition to working from home — practically overnight. With more and more employees and contractors working remotely, the cybersecurity threats that organizations face have drastically changed. So how…
Benefits of an AI-powered MFA Setup
The need for a robust and secure MFA solution is obvious with the rise in frequency (and sophistication) of cyberattacks. IS engineers and product managers frequently struggle to choose between the ease of integration, security, and end-user experience when optimizing their MFA. In this article, we’ll share an AI-powered MFA setup that answers not only the integration concerns that IT departments might have, but also addresses questions about user adoption and great UX.
What 2FA security does Fortnite, Epic Games, Discord and Call of Duty use to protect gamer accounts?
When it comes to gaming, it’s not always fun and games. If the recent Twitch breach which exposed 125GB of the company’s data taught us anything, it’s that the gaming industry is a vulnerable target in cyber attacks. Product Managers need to find 2FA security that will keep users and their sensitive information safe. Interestingly,…
What is 2SV, and what is the difference between 2SV and 2FA?
This article explains the difference between 2SV and 2FA and how to protect your user’s accounts by enabling 2SV as part of a user-friendly 2FA flow.
How to stop Account Sharing and increase SaaS revenue
Account sharing affects many industries, but the one making the headlines lately is the streaming industry. In an attempt to make the streaming service profitable, Netflix is set on stopping account sharing.
SaaS authentication best practices to improve the security of your platform
SaaS authentication refers to account protection of applications where providers can opt for various account security measures like Single Sign On (SSO), Security Assertion Markup Language (SAML) coupled with 2FA/MFA flows, identity governance, and administration (IGA) solutions to enhance security and avoid account takeover.
The top 2FA solution trends for 2021 and how Github, Zoho, Jira, and Hubspot secure their users’ accounts
Factors in a 2FA solution have drastically evolved since the mid-’90s. As we know it in 2021, account protection has developed due to increased attention from security departments over the past years. More sophisticated attacks on business and consumer accounts have led to increased demands for better security policies.
User-friendly alternative to SMS two-factor authentication any product manager must know
SMS two-factor authentication (2FA) is an additional security method that uses SMS one-time passwords (OTP) or codes that are delivered via text message. When trying to log into their accounts, users are prompted to enter an OTP delivered via SMS (short message service or a text message) in specially designed pages or fields to verify a transaction or login.
How to reduce customer churn with user-centric authentication
Building compelling products has never been more challenging, especially with product managers getting busy understanding how to reduce customer churn. Expectations towards user-friendly products are rising, especially as the first digitally native generation becomes the largest population online.
Two-factor authentication with TypingDNA Verify 2FA and PHP Laravel
This article will teach you how to use TypingDNA to implement Multi and 2FA-Factor Authentication in a Laravel Project giving your application an extra method of authentication — making it more difficult for cyber criminals to impersonate your users.
How to use a keystrokes per hour test to understand when you focus best
Users keen on improving their KPH (keystrokes per hour) rates through practice can now also gain new insights to help uncover analytics about focus and mental well-being.
Meet the first app that predicts your mood based on how you type
What if you could improve your daily productivity by knowing your mood hour-by-hour? With the launch of TypingDNA Focus BETA, you’re now able to see how your mood changes throughout the day, leverage those insights for better focus, and improve your productivity.
TypingDNA Focus charts [explained]
While this is still an experiment, we’ve been able to train unique deep learning models to predict several moods with very good accuracy. You’ll discover when you’re most focused, tired, stressed, happy, energetic, and calm.
Typing patterns and the type-to-output tool
Typing patterns are the digital representation of a person’s unique typing behavior, similar to physical biometrics such as fingerprint recognition, facial recognition, and iris scanning.
How To Implement Biometric 2FA in a Cryptocurrency Wallet with Python, Flask and TypingDNA
This article focuses on implementing biometric two-factor authentication (2FA) and risk-based authentication (RBA) in a cryptocurrency wallet built with Python and Flask using the TypingDNA Authentication API.
TypingDNA launches Verify 2FA, a smart typing biometrics-based authentication alternative to replace SMS OTP
We are thrilled to announce the launch of TypingDNA Verify, a smarter 2FA method that replaces SMS codes, improving the user experience while reducing costs by an order of magnitude.
Adding two-factor authentication to your iOS app using TypingDNA
The following post will cover how the TypingDNA Authentication API works and how to integrate into an IOS application in four easy steps.
Adding multi-factor authentication to your app, the easy way
Most applications use a username/password combination to authenticate or log in their users. Some of them use a second method on top of the first, like a token or code sent via SMS. That is commonly called 2FA or two-factor authentication.
Ecommerce fraud: What it is and how to prevent it
As consumers switched to online shopping, fraudsters followed suit—to the point that ecommerce fraud reached its highest recorded peak.
TypingDNA Focus, a unique app to help users improve productivity by analyzing their typing patterns
Focus, a unique app using a new typing biometrics technology to help users better understand their state of mind and leverage data for better focus and to improve productivity.
The TypingDNA Hackathon Saga – Volume 1
Thank you to everybody who joined the TypingDNA Hackathon. We are super excited about all of your submissions!
Simple, free, and unlimited typing biometrics authentication
We’re excited to announce the release of a free, unlimited Developer plan and updates to the Authentication API. A new one-call API significantly eases the integration process without sacrificing functionality.
AI facts devs need to know before changing focus to machine learning
The hype around AI is rapidly growing to transform the domain as one of the fastest evolving technology sectors. This infographic highlights several AI facts, every developer should know before changing their focus to machine learning or artificial intelligence.
Join the TypingDNA Hackathon and experience the frictionless authentication wave
We are excited to announce the TypingDNA Hackathon, an open contest for anyone who is up for a challenge and wants to experience the frictionless authentication wave.
TypingDNA’s typing biometrics authentication is now integrated with the ForgeRock Identity Platform
The ForgeRock-TypingDNA partnership aims to deliver user-friendly and secure customer and workforce authentication experiences. The integration of TypingDNA’s authentication API enhances security by preventing account takeovers as an integral part of holistic risk-based authentication (RBA) and two-factor authentication (2FA) systems.
5 thoughts from the DevTalks conference
We wrote down five thoughts to take home from the DevTalks conference, and a short overview of our colleagues’ presentations on biometrics and TypingDNA.
Tremend launches observED, a Moodle plugin for automated proctoring, using TypingDNA typing biometrics
The observED app leverages Tremend’s software solutions that analyze data from embedded video cameras and browsing history, as well as users’ typing behavior and device-interactions, powered by TypingDNA’s typing biometrics technology.
InSCA/PSD2
3-D Secure with keystroke dynamics for PSD2 compliance
All in all, deploying keystroke dynamics within the 3-D Secure protocol can be the right move for merchants, banks, and payment issuers to become PSD2-compliant in a quick, secure, and user-friendly way.
TypingDNA is delivering its typing biometrics solution for Microsoft Azure Active Directory B2C clients providing frictionless multi-factor authentication
TypingDNA’s typing biometrics Authentication API now works with Microsoft Azure Active Directory (Azure AD) B2C to ensure seamless authentication. TypingDNA’s proprietary AI technology recognizes people by the way they type on their keyboards and will enable Azure AD B2C customers to have comprehensive and robust protection against sophisticated threats such as password spray and brute force attacks.
How to prevent credential stuffing with keystroke dynamics authentication
Check out these two quick ways on how to use keystroke dynamics authentication to prevent credential stuffing and secure your customers’ information in a user-friendly way.
InCOVID-19
How the COVID-19 pandemic challenges the biometrics industry
COVID-19 has affected a number of industries, and biometrics— a very promising market that is expected to reach about $20 billion in 2020—is no different.
Despite BFSI request for SCA delay, deploying keystroke dynamics is the right move amid COVID-19 cyber threats
Cyberattacks are on the rise in the COVID-19 era. Despite BFSI push to delay SCA, secure your systems with keystroke dynamics authentication today.
A guide to proctoring and student identity validation with keystroke dynamics
Deploy student identity validation with keystroke dynamics to maintain the integrity of your assessments and protect the reputation of your institution in a privacy-friendly way.
Identity fraud TCO: Millions of dollars, a damaged reputation, and customer churn
No matter the industry, identity fraud and account takeover can translate into a ruined business. Companies can implement security measures even during account opening with sound identity verification proofing technologies.
Sophia Learning’s COVID-19 relief campaign offers free ACE-recommended general education online courses, secured with typing biometrics
TypingDNA is happy to contribute to Sophia’s learning platform by offering our typing-based authentication to verify learners’ identities for free.
Banks, fintechs deal with increased cyber threats in the COVID-19 era
Banks across the globe are seeing a rapid increase of cybersecurity threats. And, while the economic impacts of COVID-19 are likely to subside, these cyberthreats are here to stay.
User-friendly authentication for online payments
Typing biometrics, a behavioral-based technology, can prevent online payment fraud and provide user-friendly authentication for online payments.
NY DMV approves keystroke analysis as a validation method
The New York Department of Motor Vehicles (DMV) was one of the first in the U.S. to approve biometrics as a compliant technique for student identity validation.
Coronavirus and cybersecurity: Work and learn from home challenges
The escalation of the COVID-19 threat has forced thousands of companies worldwide to implement various measures to limit contamination by ensuring employees avoid contact with one another.
COVID-19 is disrupting education, so we made our API free to support online learning
To help with exam proctoring and students’ remote authentication, we are giving schools and universities our typing biometrics authentication API service for free within their learning management platforms. Our technology allows students to prove their identities by simply typing a short text on their keyboards.
RSA Conference: community, collaboration, and the future of cybersecurity
We share thoughts about our experience at the RSA Conference, the main topics we discussed, and how those topics relate to our company’s mission.
Why banks should deploy keystroke dynamics authentication
Banks should deploy keystroke dynamics as a modern security method to provide seamless authentication and to drive technological innovation.
TypingDNA’s review of 2019 and goals for 2020
Read more about TypingDNA’s vision and objectives, including a short review of our best moments in 2019, and plans for the journey ahead in 2020.
How quickly can TypingDNA recognize you?
You can count on TypingDNA’s typing biometrics to recognize typing behavior with great confidence, depending on what typing pattern you choose to use, as well as the size, and the number of typing samples enrolled for a user profile.
What’s next for TypingDNA following Series A round?
What’s next for TypingDNA is a promising perspective of growth and promotion of typing biometrics worldwide.
FAQs – Why TypingDNA’s typing biometrics authentication is highly-accurate?
Highly-accurate typing biometrics authentication can be used to protect users’ accounts. Read about how TypingDNA ensures the accuracy of the technology.
Intelligent authentication – a competitive advantage for challenger banks
Challenger banks can use intelligent authentication to comply with regulations and to develop a competitive advantage against competitors.
TypingDNA announced expanded typing biometrics authentication for mobile at Gartner IAM Summit 2019
TypingDNA announces expanded typing biometrics authentication to Android, iOS, and React Native at the Gartner Identity & Access Management Summit 2019.
FAQs – Why MFA prevents fraudulent enrollment?
Using MFA (multi-factor authentication) securely prevents fraudulent enrollment and safeguards against fraudulent access to accounts.
Types of behavioral biometrics: Keystroke dynamics
Typing biometrics is an additional layer of security that provides seamless, continuous user authentication virtually impossible to imitate due to the innate nature of these characteristics.
User-friendly authentication to comply with CCPA
To comply with the California Consumer Privacy Act, companies should put user-friendly authentication into practice during login to prevent data breaches.
TypingDNA is operating in compliance with several ISO standards
TypingDNA is glad to announce compliance with International Organization for Standardization – ISO standards.
Fighting facial recognition wildfires with substitute technology
Less invasive biometrics such as typing biometrics and fingerprint scans can be a reliable, sound option for the future of identity validation.
FAQs – How do we ensure customers’ privacy?
Companies must ensure customers’ privacy, at all costs. We value the privacy of our users the most, for any information, feel free to contact us.
Behavioral biometrics: signature analysis | cognitive biometrics
TypingDNA presents the various types of biometrics and explores their use for authentication and beyond.
4 takeaways from How to Web conference
Defining a north star metric, keeping things simple and making data-driven decisions are some of TypingDNA’s takeaways from How to Web conference.
TypingDNA mentioned in Gartner’s Magic Quadrant for Access Management as a partner to Optimal IdM
TypingDNA is mentioned in Gartner’s Magic Quadrant for Access Management* as a partner to Optimal IdM.
Behavioral biometrics: gait analysis – voice ID
In this series, we present various types of biometrics and explore their use for authentication. In our latest blog post, we spoke about mouse use characteristics and analyzed their use cases.
PSD2: The new 3D Secure 2.0
The 3D Secure security protocol is one of the key changes deriving from PSD2 and the SCA(Strong Customer Authentication) amendments.
FAQs – If your typing pattern changes, can you still be authenticated?
We recommend at least one additional security factor to be put in place, so in case your typing pattern changes, you will still be able to log in.
FAQs – What is typing biometrics?
What is typing biometrics technology? It is embedded in peoples’ transient behavior when typing on a keyboard. See how it works, here.
Types of behavioral biometrics: Mouse use characteristics
Biometrics represent uniquely identifying and measurable patterns in human interaction with devices such as the mouse use characteristics.
InMFA
A quick guide to choosing multi-factor authentication methods
In a world with an increasing amount of cyber threats, the question posed is no longer whether we need authentication. The real question is how to choose the right MFA methods to suit your security needs, and this is the focus of this blog post.
PSD2: EBA’s Opinion on SCA elements as of June 2019
The new Payment Services Directive – PSD2 is meant to better the current state of the European financial markets, adapt to the technological advancements of recent years, and propose up-to-date, common standards across the EU.
A review of the evolution of multi-factor authentication (MFA)
The evolution of MFA methods changed the face of cybersecurity. Technological developments promise affordable and user-friendly MFA.
EBA approves typing biometrics in SCA of PSD2
The European Banking Authority clarifies on what constitutes a compliant element in each of the three possible categories of multi-factor authentication: inherence, possession, and knowledge. EBA approves typing biometrics as compliant to be used in multi-factor authentication.
Common drawbacks of multi-factor authentication
MFA brings forth strong layers of security, helps companies achieve compliance, and increases flexibility and productivity by removing the burden of passwords.
InMFA
Significant MFA deployment factors to look for
Implementing MFA comes with multiple benefits like high security (one factor is not enough), better access control and compliance with regulations in various industries.
TypingDNA announces new MFA solution based on typing biometrics at the Gartner Security & Risk Management Summit 2019
TypingDNA today announced an innovative MFA solution that combines proprietary typing biometrics technology, SMS OTP or Email OTP at the Gartner Security & Risk Management Summit 2019.
TypingDNA and XTN Cognitive Security partner to redefine online banking user experience
TypingDNA partners with XTN Cognitive Security, an award-winning cybersecurity company, to help banking organizations defend against increasingly sophisticated fraud threats.
MFA with typing biometrics, an essential part of any IAM system
MFA combined with typing biometrics and other authentication factors such as email OTP or SMS OTP results in a robust and stealth account protection for both customers and employees.
Typing biometrics for secure and frictionless multi-factor authentication (MFA)
Leveraging typing biometrics with almost any other factor of authentication allows for frictionless and affordable online privacy protection.
How authentication impacts the experience of eLearning participants
The adoption of automated authentication measures is a more accessible way to validate participants’ identities in online learning. We take a quick look into what are the main differences between existing methods.
Webinar about the future of authentication
We are pleased to announce an insightful webinar co-hosted with our partners from Optimal IdM.
TypingDNA raises $1.5M seed round
TypingDNA recognizes people by the way they type around the world with new funding.
New partner: Optimal IdM
We are glad to let you know that Optimal IdM (a global provider of innovative and affordable IAM solutions) has joined our mission to provide a “no more painful” authentication to its customers, as a partner.
Authentication requests, free for early-stage startups & non-profit organizations
We are glad to announce that we support early-stage startups and non-profit organizations, by offering our typing biometrics authentication API service for free.
Introducing TypingDNA Authenticator
Verification codes in your browser, secured by the way you type.
TypingDNA’s latest behavioral biometrics breakthrough speeds up the authentication process
TypingDNA’s latest behavioral biometrics breakthrough speeds up the authentication process.
Improving risk-based authentication techniques with typing biometrics
Risk-based authentication hones the two-factor approach by requiring an extra log-in step only when the risk score is high, thereby reducing shopping cart abandonment and making it easier to log-in.