It’s official! We raised a record-breaking $543M in Series A funding. Learn more

Fraud & Risk

Fraud & Risk

Keep your company, users and data protected 100% of the time

thumbnail

SpotlightID: Meron Behar

Transmit Security Chief Information Security Officer (CISO) Meron Behar is looking to the future of cybersecurity with great anticipation. After spending his early...

thumbnail

The Rise of Account Takeovers and How to Prevent Them

Account takeovers (ATOs) don’t always make headlines, but a surge in large-scale supply chain and critical infrastructure attacks have grabbed our full attention....

thumbnail

Why SMS Two Factor Authentication Isn’t Enough. And What You Should Use Instead

One-time passwords sent via SMS aren’t a reliable indicator of identity. And, as it turns out, they never really were in the first...

thumbnail

5 Ways to Keep your Remote Workforce Safe, Secure & Productive

While many companies will acknowledge that securing a remote workforce has always been a task that was pushed to the side - nothing...

thumbnail

Microsoft Authenticator: A False Sense of Security?

With all the hype surrounding Authenticator Apps, I decided to enable the Microsoft Authenticator on my personal Microsoft account. Microsoft describes the Authenticator...

thumbnail

How to Combat Account Takeover Attacks with Adaptive MFA and Continuous Monitoring

Each year, institutions spend millions into protecting users from fraud attacks and scams. However, despite the amount of time and resources dedicated to...

thumbnail

5 Ways User Accounts are Breached

Account takeover is the most serious identity problem the industry is facing when it comes to user security. It has been with us...

thumbnail

FBI Warns of MFA Vulnerabilities

In September the FBI’s Cyber Division released a Private Industry Notice (PIN 20190917-001) warning that they were observing attacks that were circumventing some...

thumbnail

Disney, Macy’s & T-Mobile were Just Hacked: Learn to Live with It!

Over the past few weeks significant data breaches involving three very well-known and respected brands were reported. The Macy’s breach, which resulted in...

1 2

We use cookies to provide the services and features offered on our website and to improve our user experience. Learn More.