Blog
Expert Insights Awards TypingDNA Best of Zero Trust Solutions, Plus 2 More Cybersecurity Categories
On April 12th, 2022, Expert Insights announced their “Best Of” Cybersecurity awards — declaring TypingDNA as the winner across 3 major categories. Expert Insights declared TypingDNA as the winner across 3 cybersecurity categories: Best of Zero Trust Security (ActiveLock) Best of Multi-Factor Authentication (Verify 2FA) Best of Biometric Authentication (ActiveLock and Verify 2FA) Expert Insights…
HIPAA compliance checklist for remote employees in 2022
With rising cyber threats and more people working from home, securing endpoint devices has never been more critical. In the healthcare industry, the Health Insurance Portability and Accountability Act (HIPAA) protects private and sensitive patient data by requiring organizations handling healthcare information to pay closer attention to their protocols and institute airtight security safeguards. Hospitals,…
Cybersecurity Executive Order 14028: What You Need to Know for 2022
In May of 2021, the Biden administration took a big step toward modernizing the cyber defense of the United States. As a response to the growing number of high profile security breaches, President Biden signed Cybersecurity Executive Order 14028 “Improving the Nation’s Cybersecurity” — with the goal of protecting federal networks from cyber threats. It…
If Using Facial Recognition Software for Workforce Authentication, STOP
When the pandemic forced millions of employees to suddenly work from home, it came at a huge cost to company security — leaving IT security teams unprepared to scale their data security responsibilities. To protect their companies, some turned to stricter protocols to better monitor internal threats, including verifying employee identities with facial recognition software….
Enhancing next-generation security with continuous authentication: XDR explained
As cyber threats have evolved, so has the security landscape — with incredible resources being allocated to protect company assets and keep bad actors at bay. Endpoint security today has seen a transition from endpoint detection and response (EDR) to extended detection and response (XDR), which pushes the capabilities of EDR and offers holistic protection for endpoints, networks, and enterprise workloads.
How the BPO Industry Safeguards Data When Employees Work Remotely
Prior to 2020, many in the BPO industry had never even considered working from home. In fact, most BPO companies historically operated out of an office with dedicated equipment and established security practices. But the pandemic changed all that, and now nearly 66% of employees say they’re not going back. With sensitive client data no…
Complementing endpoint security with continuous authentication
Recent digital transformation initiatives across businesses and remote work environments have further contributed to an even more important role of endpoint security software. In this article, we explore the addition of continuous authentication as a complementary solution for enhanced security.
TypingDNA launches ActiveLock, a continuous authentication solution to prevent unauthorized use of company computers
We are thrilled to introduce TypingDNA ActiveLock, a typing biometrics-based continuous authentication technology that prevents unauthorized users from accessing company equipment and offers real-time biometric-level security without impacting the employee experience.