Blog

Blog

How to comply with PSD2 authentication without a headache

Medication and a glass of waterThe European Union’s Payment Services Directive 2 (PSD2) regulation finally came into full force in most countries this year, putting the burden on companies to meet authentication requirements for payments. Regulations like these often come with additional security hoops consumers have to jump through. But it doesn’t have to be that way. With the right strategy, companies can provide frictionless online experiences while remaining compliant with constantly changing regulations, including PSD2. Using passive behavioral biometrics, you can seamlessly verify that

Read More >

How behavioral biometrics can stop social engineering and malware scams dead in their tracks

Woman browsing on her mobile phoneSuppose you get a frantic call from your aunt, Rose. She tells you that she’s been contacted by IRS collection officers and she owes them money. While on the phone with her, the “IRS” coached Aunt Rose on how to pay, which included prompting her to log in to her bank account and wire them money, which she did. Aunt Rose has just been scammed — or more accurately, coached. Also called coercion or social engineering with user interaction, coaching

Read More >

User experience – a delicate balance?

Gymnastic move, upside down splitsCustomers expect streamlined and easy online experiences. A little friction is okay — most people don’t object to typing in their password every once in a while. But when companies start layering on security steps like one-time passwords and security questions, customers can get frustrated quickly. Strong online security is important, especially with sophisticated attacks on the rise. But it shouldn’t come at the cost of user experience. To protect users’ accounts and data without relationship-damaging levels of friction, you

Read More >

Ransomware attacks: How to protect against real-life data hostage threats

Ransomware attacks: How to protect against real-life data hostage threatsThe plot of every Hollywood movie ever made about hostage for ransom situations always ends in the same way: the hero saves the day and the villain goes to jail. But real life isn’t always a movie, and holding data for ransom is becoming more common. In fact, ransomware attacks are on the rise across verticals. Ransomware is a type of malicious software, or malware, that bad actors use to restrict access to data until the target pays a fee

Read More >

What is the digital identity?

What is digital identity?As more of our everyday activities shift online, from grocery shopping and mortgage applications to school exams, the ability to trust other people’s digital identities is critical. But unfortunately, it’s getting harder to make sure people online actually are who they say they are. Identities online can be challenging... Specifically, there’s a lack of streamlined, interoperable fraud solutions designed to manage the complexity of today’s online environments. There are more ways to interact online than ever before. Users log in

Read More >