Blog


Your Identity And How It Is Used In The Digital World

Identity: Who you are. Who you identify as. Who others identify you as. The makeup of your very existence. This identity, while in constant flux, is used in your digital world, as well. That digital identity is made up of different identifiers and attributes (your traits and personality, in other words), are used most commonly […]


Sacramento Region Innovation Awards Winner for Software

traitware Inc. is extremely pleased to announce that the traitware® Secure Login Solution was selected as the 2018 Winner in the Software category.


Five Star Bank Tank

Is a means to connect fundable startup and early-stage growth companies with serious deal makers in a private, invitation-only setting exclusively for accredited private investors


Sacramento Region Innovation Awards Names 2018 Finalists – Winners Revealed November 1

Twenty-one FINALISTS have been named in the third annual SACRAMENTO REGION INNOVATION AWARDS.


Secure Login for WordPress: New Features Include Site Users

With Streamlined On-boarding and User Management, traitware Positioned to Secure the #1 CMS WordPress


Reused Passwords lead to data breaches.

Phishing attacks continue to be a mainstream enterprise for credential grabbing ( passwords ). The attackers continue to evolve their methods


Convenience can cost irreplaceable time and money.

Certain popular mobile devices allow you to create trusted environments, overriding the secure login. This enables leaving your device unlocked for convenience when at home or in your car.


Is your business providing the client login a Simple yet Secure Login?

Across multiple types of business from banking to web-only based stores. A common practice I see is that the business is going to great lengths to secure itself.


Your part in Social Engineering

On top of all the rest of our daily concerns, we have to worry about Social Engineering cyber attacks.


“Secrets to a better password and fewer hacks” published by CNBC

It goes on to talk about a machine that IBM built (the Cracken) that can crack any password up to 14 characters in 5 minutes or less.


Are You Becoming Numb to Data Breaches?

Nearly every day we read about yet another data breach. They come from every market and size of company.


Secure Login News

Recently, the topic of protecting the individual (user) at the point of entry (login), to a application or digital resource has risen to the top of security discussion.