Blog
What is the Department of Defense Zero Trust strategy 2022, and how to comply with it?
The US Department of Defense Zero Trust strategy means increased security across all government bodies by giving no inherent trust to any user accessing apps, networks, or systems. The DoD Zero Trust strategy enables the transition from static, network-based security to a more dynamic collection of cybersecurity practices. Read on to find out what a…
ActiveLock’s log aggregation options (product updates)
We want to thank you for the fantastic feedback we’ve received since the launch of ActiveLock, our continuous endpoint authentication solution. “TypingDNA was easy to install and learns how the user types. I tested this by completing the training portion and then had another user type a memo. Within six words, it had locked the…
BYOD Security: Reducing Enterprise Risk With Continuous Endpoint Authentication
Updated 8/2025 BYOD stands for Bring Your Own Device and is a practice in which personal devices are used to complete work-related tasks. BYOD has both pros and cons. On the one hand, BYOD can increase productivity and lower costs for enterprises and their employees. On the flip side, allowing contractors or employees to use…
WSO2 Integrates TypingDNA for Seamless User Authentication
On August 18, 2022 TypingDNA became a WSO2 Technology Partner, integrating the proprietary typing biometrics Authentication API into the WSO2 CIAM Platform. WSO2 customers can now leverage typing biometrics as an additional layer of robust protection against sophisticated cyber threats — ensuring secure and user-friendly authentication throughout every customers’ journey. TypingDNA’s Authentication API integration is…
Insider Threats To Watch Out for With a Remote Workforce
Insider threats include individuals within an organization who purposely or by mistake expose company information. Because proprietary data, customer information, and trade secrets are the heart and soul of any enterprise, security systems and processes to reduce insider threats are essential. Surprisingly, most insider threats result from negligent employees, such as those working remotely, who…
How to build an authentication flow in a CRUD app with Vue 3 and TypingDNA Verify 2FA
In this tutorial, you will learn how to use TypingDNA Verify 2FA to secure a CRUD application. This application was built with Vue, Quasar, Express, and TypingDNA Verify 2FA. It is a single-page application that has the following views: VerifyView, HomeView. The VerifyView is where you will use TypingDNA Verify to verify the user’s typing…
PCI DSS Compliance Requirements for Remote Work: 5 Things You Must Know
If your business handles credit card and payment information, you’re responsible for keeping that cardholder data secured by obeying the Payment and Card Information Security Standard (PCI DSS) compliance requirements. But when your workforce is remote and your endpoints are unprotected, keeping that data safe is an unprecedented challenge facing today’s security teams. As more…
Windows Defender for Endpoint Can Stop a Cyberattack, But Not Device Sharing
Windows Defender for Endpoint and similar antimalware/antivirus systems are all pretty good at analyzing incoming cyber threats that target endpoints, and responding to virus threats. But, what these systems fail at is providing visibility into whether the employee you trusted with that company endpoint is the one who’s actually accessing it throughout the entire workday —…