Blog


GitLab Inc. and TraitWare Deliver Enhanced Security and Simplicity for the Software Development Community

Zero Trust Multi-Factor Authentication (MFA) and Single Sign-On (SSO) Combined for Seamless User Experience and Secure Access to GitLab RENO, NEVADA, USA, October 3, 2022 /EINPresswire.com/ — GitLab Inc., provider of The One DevOps Platform, and TraitWare Inc., providing native passwordless MFA and SSO for enterprise login, today announced their partnership, which delivers simpler, secure access for […]


MFA Fatigue – What We Learned From the Uber Breach

What Happened, and How Can We Prevent Attacks Like these? Not All MFA Is Created Equal The recent cyber-attack on Uber has had the tech community buzzing. The incident, an example of an attack method called MFA Fatigue, brings up an essential point about MFA that all individuals and organizations need to know: Not All MFA […]


CYBER INSURANCE WON’T PAY

Unless You Do These Things First Company budgets are now being firmed up for 2023 and, as the frequency, severity, and cost of cyber-attacks increase dramatically, it’s no wonder that enterprise demand for cyber insurance has also skyrocketed. But, while cyber insurance may seem like a relatively easy way for a company to plug in […]


Zero Trust Security & Identity and Access Management (IAM)

Time to Fix What’s Broken Zero Trust Security & Identity and Access Management need to be updated for the modern workplace. The days of Castle-and-Moat security for the organization – where everything was considered secure inside corporate perimeter walls – are over. Today, users are seldom in one place, so security must consider every identity […]


Why MSPs are at Risk of Attack

And How MSPs Can Reduce Risk In a joint advisory issued this May, several International government agencies — the Cybersecurity and Infrastructure Security Agency (CISA), the UK’s National Cyber Security Centre (NCSC-UK), the Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NZ NCSC), US National Security […]


TraitWare® and Gradient MSP simplify the billing process for MSPs

Joining Forces with Gradient, TraitWare® now integrates with the Synthesize Platform to facilitate automated billing processes for its MSP Partners. TraitWare is the only passwordless MFA vendor currently supporting the Synthesize platform. The integration means billing reconciliation is now automated for all TraitWare partners, making it easier than ever to efficiently manage complex billing details. […]


Phight the Phish with Phishing-Resistant MFA

This is something worth thinking about as cybercrime continues to grow and evolve, and as companies are looking to protect themselves and company valuables from costly attack.  Cybercriminals are getting craftier with their methods. Take recent news of a Phishing attack targeting Microsoft 365 email accounts. This large-scale campaign used a relatively new method called AiTM or Adversary […]


Trust and Security. Why to choose TraitWare.

A People Story TRUST. It’s a people thing. Not a technology thing. People build reliable technology. Not the other way around. Choosing which cybersecurity tools you trust to implement and use starts with people. If you’re looking for a solution, you need to know what exactly they are selling, who’s behind it, what problems the […]


What is Island Hopping? How can you best protect your business from attack?

Island Hopping - NOT a Holiday Thing


TraitWare Earns SOC 2 – Type II Certification

TraitWare TraitWare Inc., market leader for enterprise-class native Passwordless Multi-Factor Authentication (MFA) and Single Sign-On (SSO) combined for simple secure login, today announced that it has successfully completed the SOC 2 Type 2 audit. Conducted by Eide Bailly LLP, a leading North Dakota-based certified public accounting and business advisory firm, the audit affirms that TraitWares information […]


Shadow IT and the Cloud – An Ominous Partnership

Today the ready availability of cloud-hosted software has made it easier than ever for individuals to adopt unofficial software.  This Shadow IT significantly increases the complexity of the attack surface an organization must protect.   Many IT and governance teams and the tools they use are ill-prepared for the size of this challenge.  Shadow IT – […]