Developer

Developer

Identity infrastructure, authentication and technology Trends

Deploying FIDO 2.0: Usability vs. security
Developer
Deploying FIDO 2.0: User Interaction Models and Implementation Challenges

Our reliance on online services is ever-increasing. These services are affecting us nowadays more than ever: they are conduits to our social interactions, finances, general...

Using bindid mobile passwordless authenticator
Developer
BindID: The Mobile Authenticator That’s Transforming the Identity Security Space

The journey of authentication has come a long way since the humble password. Although constantly evolving and improving, many authentication methods today still prove to...

Time-Based One-Time Passwords (TOTP)
Developer
Time-Based One-Time Passwords: The Good, the Bad and the Ugly

One-time passwords (OTPs) are a common method of implementing a “something you have” factor for multi-factor authentication (MFA).  These single-use codes can be implemented in...

Combat Account Takeover Attacks with MFA
Developer
How to Combat Account Takeover Attacks with Adaptive MFA and Continuous Monitoring

Each year, institutions spend millions into protecting users from fraud attacks and scams. However, despite the amount of time and resources dedicated to identity protection,...

FIDO2 What’s the Difference Between CTAP and WebAuthN
Developer
Introduction to FIDO2, CTAP, and WebAuthn

Password-based authentication is the most common form of user authentication; however, it is notoriously insecure. Passwords are commonly weak, reused, or exposed in data breaches.Other...

Developer
Why I Joined Transmit Security

A Journey From Happy Customer to Avid Employee. I first learned of Transmit Security in the Spring of 2016. I was working at HSBC, London,...