top of page


Don Bush
Feb 123 min read
12
0


Karen Simmons
Dec 4, 20243 min read
The Security Paradox: How to Protect Users Without Ticking Them Off
Login processes can make or break a user experience. Excessive reliance on multi-factor authentication (MFA) often deters users from...
23
0


Justin McDonald
Nov 20, 20243 min read
Is your Identity Solution Balanced? Prevention or Remediation
Balancing prevention & remediation is key in protecting against ATO. Choose the right mix to minimize risk & customer friction.
17
0

Justin McDonald
Oct 30, 20242 min read
New White Paper from The Fraud Practice and myNetWatchman Discusses Balancing Protection Against ATO with Preserving the User Experience
We provide an alternative perspective on the myth that 2FA makes user credentials secure so you don’t need to detect compromised credentials
13
0

Karen Simmons
Oct 23, 20243 min read
Anatomy of Email Compromise
Protect your castle! Compromised emails put data & accounts at risk. Businesses using email for 2FA need a new approach. #cybersecurity
32
0


Karen Simmons
Sep 4, 20244 min read
Anatomy of an FI Credential Stuffing Attack
Financial Institutions are not immune to credential stuffing. Here’s an example of an attack on an FI, its risk and success.
39
0


Grace Howard
Aug 28, 20241 min read
myNetWatchman Cybersecurity Glossary
Whether you’re a professional, a business owner, or an end user, here are common cybersecurity terms you should know. 2FA Two-factor...
15
0
bottom of page