Syndicated Blog

Whitehouse Doubles Down on the Imperative for Phishing-Resistant MFA

Whitehouse Doubles Down on the Imperative for Phishing-Resistant MFA

In today’s online world, the importance of robust cybersecurity measures cannot be overstated. Cyber threats continue to evolve, and organizations, both public and private, face a constant battle to protect sensitive data ...
RIP Passwords: Why the Future Is Passwordless

RIP Passwords: Why the Future Is Passwordless

Almost every website, app, and user platform now requires usernames and passwords. And for user data to remain secure, passwords must be strong—most platforms require a mix of upper and lower case ...
Barbara Mandrell -- I Was Country When Country Wasn't Cool

How Secure Are Passkeys?

As I was walking around Identiverse last week, I was reminded of the old Barbara Mandrell song, “I Was Country, When Country Wasn’t Cool.” HYPR has been doing passkeys since passkeys (then ...
Meet Matt Hartley, HYPR’s CRO

Meet Matt Hartley, HYPR’s CRO

HYPR recently announced the appointment of Matt Hartley as our Chief Revenue Officer. With more than two decades in cybersecurity and technology, Matt brings invaluable expertise in sales leadership and go-to-market strategies ...
Authentication in the Time of Generative-AI-Strengthened Attacks

Authentication in the Time of Generative-AI-Strengthened Attacks

There has been much excitement and buzz around generative AI in recent months. New tools pop up every hour that will undoubtedly make us humans far more efficient. At the same time, ...
Microsoft 365 Number Matching for MFA

User Experience Conquers All

At Identiverse 2023, the narrative around removing the password has reached inevitability: it’s not if or how, it’s when. Unsurprisingly, passkeys were a common theme because they’ve achieved the two requirements for ...
An Intro to PSD2 SCA Requirements

An Intro to PSD2 SCA Requirements

It’s estimated that by 2024, 74% of fraudulent card transactions worldwide will involve card-not-present (CNP) transactions. The PSD2 regulatory framework is designed to protect customers and financial institutions operating in the digital ...
Using "Approval-as-Code" in Access Management

Using “Approval-as-Code” in Access Management

In today's modern work environment, effective management of user identities and access is crucial for securing enterprise applications, systems, and data. As organizations increasingly deploy cloud-based services and resources, managing access has ...
Are You Ready for the FTC MFA Requirements?

Are You Ready for the FTC MFA Requirements?

What Are the FTC MFA Requirements?  In October 2021, the FTC announced that it was updating the Safeguards Rule. The Safeguards Rule took effect in 2003 as part of the Gramm-Leach-Bliley Act ...