Blog
TypingDNA named leader in Frost & Sullivan’s 2023 Radar Report
Frost & Sullivan, a global market research firm named TypingDNA a Leader in the 2023 Global Biometric Verification Solutions research report. The report identifies companies that show significant growth and innovation within the biometric verification market — marking a significant step for typing biometrics as a verification method alongside popular vendors. “Behavioral biometrics remains one…
How to prevent common types of social engineering attacks with behavioral biometrics
Enterprises can protect their sensitive information, customers, and employees from common types of social engineering attacks using behavioral biometrics for 2FA and continuous authentication. Behavioral biometrics verifies the identity of customers and business teams, preventing unauthorized users’ access to accounts and devices. In this article, we’ll look into social engineering attacks and how they work…
Three Cybersecurity Trends and Concerns for 2023
The top three cybersecurity trends and concerns for 2023 gravitate around privacy and data security as issues of growing importance. While the public and private sectors continue to take increased actions to prevent and limit the effects of cybercrimes, they must stay grounded on the present and future cybersecurity realities. At the beginning of 2023,…
Workforce MFA/2FA method that doesn’t require personal phones
Updated June 2025 To achieve security, enterprises work with IAM systems that deploy multi-factor authentication (MFA), or simply two-factor authentication (2FA). MFA allows businesses to verify their employees’ identities when they log in to corporate apps. While MFA is key to security, companies should avoid using methods that require employees to use their phones. Below,…
What is the Department of Defense Zero Trust strategy 2022, and how to comply with it?
The US Department of Defense Zero Trust strategy means increased security across all government bodies by giving no inherent trust to any user accessing apps, networks, or systems. The DoD Zero Trust strategy enables the transition from static, network-based security to a more dynamic collection of cybersecurity practices. Read on to find out what a…
ActiveLock’s log aggregation options (product updates)
We want to thank you for the fantastic feedback we’ve received since the launch of ActiveLock, our continuous endpoint authentication solution. “TypingDNA was easy to install and learns how the user types. I tested this by completing the training portion and then had another user type a memo. Within six words, it had locked the…
BYOD Security: Reducing Enterprise Risk With Continuous Endpoint Authentication
Updated 8/2025 BYOD stands for Bring Your Own Device and is a practice in which personal devices are used to complete work-related tasks. BYOD has both pros and cons. On the one hand, BYOD can increase productivity and lower costs for enterprises and their employees. On the flip side, allowing contractors or employees to use…
WSO2 Integrates TypingDNA for Seamless User Authentication
On August 18, 2022 TypingDNA became a WSO2 Technology Partner, integrating the proprietary typing biometrics Authentication API into the WSO2 CIAM Platform. WSO2 customers can now leverage typing biometrics as an additional layer of robust protection against sophisticated cyber threats — ensuring secure and user-friendly authentication throughout every customers’ journey. TypingDNA’s Authentication API integration is…