It’s official! We raised a record-breaking $543M in Series A funding. Learn more

Developer

Developer

Identity infrastructure, authentication and technology Trends

thumbnail

Deploying FIDO 2.0: User Interaction Models and Implementation Challenges

Our reliance on online services is ever-increasing. These services are affecting us nowadays more than ever: they are conduits to our social interactions,...

thumbnail

BindID: The Mobile Authenticator That’s Transforming the Identity Security Space

The journey of authentication has come a long way since the humble password. Although constantly evolving and improving, many authentication methods today still...

thumbnail

Time-Based One-Time Passwords: The Good, the Bad and the Ugly

Timed-based one-time passwords (TOTP) have been broadly adopted by many service providers as an easy and convenient way to securely authenticate users. Additionally,...

thumbnail

How to Combat Account Takeover Attacks with Adaptive MFA and Continuous Monitoring

Each year, institutions spend millions into protecting users from fraud attacks and scams. However, despite the amount of time and resources dedicated to...

thumbnail

FIDO2: What’s the Difference Between CTAP and WebAuthN?

At its most basic, FIDO2 is a set of protocols that enable web applications to use secure device biometrics (fingerprint scans, facial recognition,...

thumbnail

Why I Joined Transmit Security

A Journey From Happy Customer to Avid Employee.I first learned of Transmit Security in the Spring of 2016. I...

We use cookies to provide the services and features offered on our website and to improve our user experience. Learn More.