Developer

Developer

Identity infrastructure, authentication and technology Trends

thumbnail

Deploying FIDO 2.0: User Interaction Models and Implementation Challenges

Our reliance on online services is ever-increasing. These services are affecting us nowadays more than ever: they are conduits to our social interactions,...

thumbnail

BindID: The Mobile Authenticator That’s Transforming the Identity Security Space

The journey of authentication has come a long way since the humble password. Although constantly evolving and improving, many authentication methods today still...

thumbnail

Time-Based One-Time Passwords: The Good, the Bad and the Ugly

One-time passwords (OTPs) are a common method of implementing a “something you have” factor for multi-factor authentication (MFA).  These single-use codes can be...

thumbnail

How to Combat Account Takeover Attacks with Adaptive MFA and Continuous Monitoring

Each year, institutions spend millions into protecting users from fraud attacks and scams. However, despite the amount of time and resources dedicated to...

thumbnail

Introduction to FIDO2, CTAP, and WebAuthn

Password-based authentication is the most common form of user authentication; however, it is notoriously insecure. Passwords are commonly weak, reused, or exposed in...

thumbnail

Why I Joined Transmit Security

A Journey From Happy Customer to Avid Employee. I first learned of Transmit Security in the Spring of 2016. I...

We use cookies to provide the services and features offered on our website and to improve our user experience. Learn More.