RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Password Security, Password Tips, Regulation and Compliance
NIST 800-63b password guidelines can improve user's experience with passwords, including the guideline to stop forcing periodic password resets for users.
Credential Screening, Cybersecurity, Data Breaches, Password Security
Credential stuffing & brute force attacks use very different methods to accomplish account takeover. This article outlines what they are, how they operate and how to handle them.
Cybersecurity, Data Breaches, NIST 800-63, Password Security, Regulation and Compliance
Law firms are frequently targeted by hackers but the ABA's Formal Opinion 483 will guide law firm cybersecurity policy to protect firms and their clients.
Cybersecurity, Password Security, Password Tips
The continued barrage of reports about data breaches and account hijacking, make it painfully clear that the way organizations are managing password-based security is missing something. When we look at how cybercriminal tactics have evolved, and how compromised credential attacks have impacted these methods, one answer to the problem of the password becomes clear.
Password Security, Password Tips
How many of your users are using insecure and compromised passwords? You may have a standard password strength meter on your site so you may think that your users have secure passwords. Think again. Password strength meters and password complexity requirements are simply not enough.
Account Takeover, Credential Screening, Cybersecurity, Password Security
Billions of user credentials (usernames and passwords) have been exposed publicly over the last few years. The natural question that comes up is “what do cybercriminals do with these stolen credentials?”
No Spam. Only sweet content and updates on our products and solutions.