Find Us

123 Main Street
New York, NY 10001

Monday—Friday: 9:00AM–5:00PM
Saturday & Sunday: 11:00AM–3:00PM


Category: Compliance Regulations

Department of Defense Zero Trust Model and How To Comply With It
InActiveLock Continuous Endpoint Authentication (CEA)Compliance RegulationsZero Trust

What is the Department of Defense Zero Trust strategy 2022, and how to comply with it?

The US Department of Defense Zero Trust strategy means increased security across all government bodies by giving no inherent trust to any user accessing apps, networks, or systems. The DoD Zero Trust strategy enables the transition from static, network-based security to a more dynamic collection of cybersecurity practices. Read on to find out what a…
5 PCI DSS Compliance Requirement for remote access
InCompliance RegulationsRemote Workforce AuthenticationSCA/PSD2

PCI DSS Compliance Requirements for Remote Work: 5 Things You Must Know

If your business handles credit card and payment information, you’re responsible for keeping that cardholder data secured by obeying the Payment and Card Information Security Standard (PCI DSS) compliance requirements. But when your workforce is remote and your endpoints are unprotected, keeping that data safe is an unprecedented challenge facing today’s security teams.  As more…
InCompliance RegulationsRemote Workforce Authentication

HIPAA compliance checklist for remote employees in 2022

With rising cyber threats and more people working from home, securing endpoint devices has never been more critical. In the healthcare industry, the Health Insurance Portability and Accountability Act (HIPAA) protects private and sensitive patient data by requiring organizations handling healthcare information to pay closer attention to their protocols and institute airtight security safeguards. Hospitals,…
InCompliance RegulationsTyping BiometricsZero Trust

Cybersecurity Executive Order 14028: What You Need to Know for 2022

In May of 2021, the Biden administration took a big step toward modernizing the cyber defense of the United States. As a response to the growing number of high profile security breaches, President Biden signed Cybersecurity Executive Order 14028 “Improving the Nation’s Cybersecurity” — with the goal of protecting federal networks from cyber threats. It…
InAuthentication APICompliance RegulationsMFAPartnershipsTyping Biometrics

TypingDNA is delivering its typing biometrics solution for Microsoft Azure Active Directory B2C clients providing frictionless multi-factor authentication

TypingDNA’s typing biometrics Authentication API now works with Microsoft Azure Active Directory (Azure AD) B2C to ensure seamless authentication. TypingDNA’s proprietary AI technology recognizes people by the way they type on their keyboards and will enable  Azure AD B2C customers to have comprehensive and robust protection against sophisticated threats such as password spray and brute force attacks.