Find Us

Address
123 Main Street
New York, NY 10001

Hours
Monday—Friday: 9:00AM–5:00PM
Saturday & Sunday: 11:00AM–3:00PM

Categories

Blog

frost-feature-image
InUncategorized

TypingDNA named leader in Frost & Sullivan’s 2023 Radar Report

Frost & Sullivan, a global market research firm named TypingDNA a Leader in the 2023 Global Biometric Verification Solutions research report.  The report identifies companies that show significant growth and innovation within the biometric verification market — marking a significant step for typing biometrics as a verification method alongside popular vendors. “Behavioral biometrics remains one…
How to prevent common types of social engineering attacks with behavioral biometrics
InBehavioral BiometricsCustomer AuthenticationRemote Workforce Authentication

How to prevent common types of social engineering attacks with behavioral biometrics

Enterprises can protect their sensitive information, customers, and employees from common types of social engineering attacks using behavioral biometrics for 2FA and continuous authentication. Behavioral biometrics verifies the identity of customers and business teams, preventing unauthorized users’ access to accounts and devices. In this article, we’ll look into social engineering attacks and how they work…
How to handle MFA for employees without using personal phones
InMFARemote Workforce AuthenticationZero Trust

Workforce MFA that doesn’t require personal phones

To achieve security, enterprises work with IAM systems that deploy multi-factor authentication (MFA). Mfa allows businesses to verify their employees’ identities when they login to corporate apps. While MFA is key to security, companies should avoid using methods that require employees to use their phones. Below, we focus on why phone-based MFA is burdensome and…
Department of Defense Zero Trust Model and How To Comply With It
InActiveLock Continuous Endpoint Authentication (CEA)Compliance RegulationsZero Trust

What is the Department of Defense Zero Trust strategy 2022, and how to comply with it?

The US Department of Defense Zero Trust strategy means increased security across all government bodies by giving no inherent trust to any user accessing apps, networks, or systems. The DoD Zero Trust strategy enables the transition from static, network-based security to a more dynamic collection of cybersecurity practices. Read on to find out what a…
How to secure BYOD devices with continuous endpoint authentication
InActiveLock Continuous Endpoint Authentication (CEA)Remote Workforce AuthenticationZero Trust

BYOD Security: Reducing Enterprise Risk With Continuous Endpoint Authentication

BYOD stands for Bring Your Own Device and is a practice in which personal devices are used to complete work-related tasks. BYOD has both pros and cons. On the one hand, BYOD can increase productivity and lower costs for enterprises and their employees. On the flip side, allowing contractors or employees to use their personal…
Enable Seamless Authentication using TypingDNA integration with WSO2 CIAM Identity Server
InPartnershipsPress ReleaseRemote Workforce Authentication

WSO2 Integrates TypingDNA for Seamless User Authentication

On August 18, 2022 TypingDNA became a WSO2 Technology Partner, integrating the proprietary typing biometrics Authentication API into the WSO2 CIAM Platform.  WSO2 customers can now leverage typing biometrics as an additional layer of robust protection against sophisticated cyber threats — ensuring secure and user-friendly authentication throughout every customers’ journey. TypingDNA’s Authentication API integration is…
What are insider threats? Definition, types, threat cost and mitigation
InActiveLock Continuous Endpoint Authentication (CEA)Remote Workforce AuthenticationZero Trust

Insider Threats To Watch Out for With a Remote Workforce

Insider threats include individuals within an organization who purposely or by mistake expose company information. Because proprietary data, customer information, and trade secrets are the heart and soul of any enterprise, security systems and processes to reduce insider threats are essential. Surprisingly, most insider threats result from negligent employees, such as those working remotely, who…
The complete guide to Vue.js User Authentication with Verify2FA and Crud App
InBuilt with TypingDNAGuest Author ProgramVerify 2FA

How to build an authentication flow in a CRUD app with Vue 3 and TypingDNA Verify 2FA

In this tutorial, you will learn how to use TypingDNA Verify 2FA to secure a CRUD application. This application was built with Vue, Quasar, Express, and TypingDNA Verify 2FA. It is a single-page application that has the following views: VerifyView, HomeView. The VerifyView is where you will use TypingDNA Verify to verify the user’s typing…