Blog
Complementing endpoint security with continuous authentication
Recent digital transformation initiatives across businesses and remote work environments have further contributed to an even more important role of endpoint security software. In this article, we explore the addition of continuous authentication as a complementary solution for enhanced security.
TypingDNA launches ActiveLock, a continuous authentication solution to prevent unauthorized use of company computers
We are thrilled to introduce TypingDNA ActiveLock, a typing biometrics-based continuous authentication technology that prevents unauthorized users from accessing company equipment and offers real-time biometric-level security without impacting the employee experience.
Top cyber threats in 2021 – human error exploited, insider threats, and Ransomware as a Service
Cyber threats in 2021 have exceeded the total for 2020 costing companies worldwide an estimated $10.5 trillion. Alarming is also their increased sophistication, making the security industry one of the most fast-paced and versatile this year.
InActiveLock Continuous Endpoint Authentication (CEA)AIBehavioral BiometricsRemote Workforce AuthenticationTyping BiometricsZero Trust
Zero Trust Architecture: Learn the Basics & How to Build Your Defense
To understand zero trust architecture, you must rethink your mindset of cyber security. For years, security teams were guided by a simple code: “Trust, but verify.“ But with zero trust, security is far less laid back — guided by a more skeptical philosophy of “Never trust. Always verify.” In this article, we’ll walk you through…
DMV course providers can now use typing biometrics to validate student identities
In an announcement made public in October of this year, the NY DMV is now allowing students to take a 5 Hours Prelicensing Course to replace the Driver Education course (consisting of 24 hours of classroom instruction and 24 hours of in-car instruction) to take their road test and get their driver license.
User-friendly, typing biometrics-based alternative to TOTP authentication
TOTP was first introduced by RSA Security and was exclusively sold under patent. Once the patent expired, TOTP gained momentum and was adopted on a large scale as 2FA became more popular.
What Is Multi Factor Authentication (MFA) and Why Passwords Are Not Enough
With cyber breaches making headlines seemingly every week, one thing is clear — passwords alone are no longer enough to keep us safe. While stopping all online crime is not a realistic goal, Multi Factor Authentication (MFA) is a simple but critical step in your security flow that can massively reduce the likelihood you or your…
Continuous authentication: how it works and what you need to know about use cases and industries
What is continuous authentication? Continuous authentication is a security solution that analyzes multiple data points linked to a unique user, including browser activity, mouse characteristics, mobile sensors, and behavioral biometrics. The data points are continuously monitored to identify changes in behavior, confirming or blocking a user’s access to corporate assets or programs. Any unauthorized changes…