Blog

Blog

Discover the world of identity security, orchestration and authentication. Stay up-to-date with the latest IAM news, industry insights and emerging technologies from Transmit Security.

Authentication
Securing the User Lifecycle for Passkeys With Transmit Security

In the face of increased data breaches and account takeover attacks, there is a growing need for authentication methods that guard against phishing, credential stuffing,...

Fraud & Risk
Combat Fraud with Mobile Emulator Detection

A mobile emulator is software that mimics the hardware and software functionalities of smartphones. Although they have legitimate uses, such as developing and testing mobile...

Fraud & Risk
Solving AI’s Black-Box Problem with Explainable AI and SHAP Values

One of the key challenges in fraud detection today is the black box nature of AI-powered detection services. Designed to help teams quickly detect complex...

Blog
How Will Generative AI Reshape European Privacy Regulations?

The development of generative AI models, such as OpenAI’s GPT series, has opened up new avenues of innovation, offering numerous applications in various industries. However,...

Fraud & Risk
Protecting Customers from Device Takeover Attacks

Whether it’s preventing friction that can lead to customer dropoffs, strengthening authentication through the use of two-factor authentication or securing remote workers, the ability to...

Blog
Top 5 Analyst Talks (Our Favs) at Gartner® IAM and Key Recommendations for Customer Identity

Every year at Gartner IAM, we hear new buzzwords and concepts that catch our attention, luring us to attend another analyst session. This year, the...

Gartner IAM Talk: TIAA on Orchestration
Blog
Gartner IAM Talk: Breaking down Silos – How TIAA Uses Orchestration to Consolidate CIAM

In order to cut costs and complexity, 75% of organizations are planning to consolidate cybersecurity, according to analysts. Consolidation, done right, also closes security gaps...

Fraud & Risk
Simplifying Fraud Analysis with Transmit Security

The job of a fraud analyst is not an easy one. As professionals responsible for identifying, investigating and preventing fraud, it’s crucial that they can...

vector drawing representing decisioning orchestration
Fraud & Risk
Decisioning Done Right

Whether it’s prohibiting the online sale of alcohol to underage users, challenging users from a particular geographical region in response to unusual traffic patterns in...

SIM swapping graphic
Blog
Secure Identity Verification to Prevent SIM Swapping

Think of the breadth of information stored on your phone and the activities that could be performed simply by unlocking it. With complete control over...

Blog
The Rise of Account Fraud in the Wake of the SVB and Signature Bank Collapse & How to Stop It 

In the wake of the Silicon Valley Bank (SVB) and Signature Bank collapse, there was an immediate scramble to move money. Businesses and individuals rushed...

Fraud & Risk
How to Protect Your Users from Xenomorph

A new Android banking trojan called Xenomorph is gaining popularity among threat actors who are using the malware to steal credentials from over 450 apps,...

1 2 3 4 16