Deploying FIDO 2.0: User Interaction Models and Implementation Challenges
Our reliance on online services is ever-increasing. These services are affecting us nowadays more than ever: they are conduits to our social interactions,...
Identity infrastructure, authentication and technology Trends
Our reliance on online services is ever-increasing. These services are affecting us nowadays more than ever: they are conduits to our social interactions,...
The journey of authentication has come a long way since the humble password. Although constantly evolving and improving, many authentication methods today still...
One-time passwords (OTPs) are a common method of implementing a “something you have” factor for multi-factor authentication (MFA). These single-use codes can be...
Each year, institutions spend millions into protecting users from fraud attacks and scams. However, despite the amount of time and resources dedicated to...
Password-based authentication is the most common form of user authentication; however, it is notoriously insecure. Passwords are commonly weak, reused, or exposed in...
A Journey From Happy Customer to Avid Employee. I first learned of Transmit Security in the Spring of 2016. I...