Syndicated Blog

What is Identity Assurance?

A Closer Look at HYPR’s New Identity Assurance Solution

Earlier this month, HYPR announced our unified Identity Assurance solution, developed to secure the entire modern identity lifecycle. HYPR Identity Assurance brings together the strongest passwordless authentication, comprehensive risk assessment and enhanced ...
HYPR Affirm Demo

High-Stakes Identity Impersonation: Lessons From the MGM Attack

MGM Resorts recently found itself in the midst of a major cybersecurity incident that not only crippled its operations but also exposed sensitive customer data. The sophisticated attack orchestrated by a group ...
Five Key Takeaways From the New NSA and CISA IAM Guidance

Five Key Takeaways From the New NSA and CISA IAM Guidance

On October 4, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) jointly released new guidance titled Identity and Access Management: Developer and Vendor Challenges, which addresses ...
Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

| | Authentication, passwordless
Today’s evolving and expanding threat landscape has rendered traditional security measures inadequate for safeguarding sensitive data and systems. Organizations grapple with elevated risks as malicious actors continuously devise new ways to circumvent ...
What Is Identity Assurance and Why Is It Needed

What Is Identity Assurance and Why Is It Needed

In today's perpetually changing digital landscape, the importance of identity within the enterprise has taken center stage.  As both workforce and consumer demands grow, there's a critical need for robust solutions that ...
Identity Verification vs. Authentication

Identity Verification vs. Authentication

The recent, numerous high-profile attacks targeting identity processes, like those by the Lapsus$ group, underscore the need for strong identity security. New research by the Identity Defined Security Alliance found that 90% ...
HYPR and Yubico: The Power of Passwordless Choice

HYPR and Yubico: The Power of Passwordless Choice

With cybersecurity threats constantly evolving and becoming more sophisticated, organizations are grappling with the challenge of safeguarding their sensitive data and systems. The rise of AI-strengthened phishing attacks and vulnerabilities associated with ...
What Is Adaptive Authentication?

What Is Adaptive Authentication?

| | Authentication, passwordless
Authentication security remains a significant vulnerability in most organizations' security posture. Even individuals without technical expertise can easily acquire and employ pre-made hacking tools. Microsoft, for instance, fends off an astonishing 1,000 ...
Five Things To Know About PCI DSS 4.0 Authentication Requirements

Five Things To Know About PCI DSS 4.0 Authentication Requirements

The Payment Card Industry Security Standards Council recently updated their Data Security Standard (PCI DSS) for protecting payment card data. The latest version, PCI DSS 4.0, introduces more than 60 new or ...
Unpacking the CSRB Report: Lessons from the Lapsus$ Threat Group

Unpacking the CSRB Report: Lessons from the Lapsus$ Threat Group

The global digital ecosystem finds itself facing a new breed of cyber threat actors: loosely organized groups with a penchant for extortion, chaos, and the desire to gain notoriety. The US Department ...