Blog


TraitWare’s Passwordless MFA Secures Place in the Financial Sector

TraitWare MFA selected to Secure Federal Credit Union


Shadow IT and the Cloud – An Ominous Partnership

Today the ready availability of cloud-hosted software has made it easier than ever for individuals to adopt unofficial software.  This Shadow IT significantly increases the complexity of the attack surface an organization must protect.   Many IT and governance teams and the tools they use are ill-prepared for the size of this challenge.  Shadow IT – […]


Why Experts Urge All Businesses to Strengthen Cybersecurity Now

Multi-Factor Authentication is Top Priority In light of current world events, experts are urging businesses of all sizes to bolster security, with Multi-Factor Authentication (MFA) as top priority for the protection of our digital assets. While conflict may seem far away for most of us, the reality is that cyberspace knows no borders – and […]


The SuperBowl, Coinbase, and the Truth About QR Codes

The QR Code for Cybersecurity


You can’t have Security without Privacy

Privacy vs. Security. Can you have both? While there’s a difference, we think the two belong together – especially when it comes to Identity. While data security has become increasingly important for companies of all sizes – with the risk and severity of cyberattack steadily rising – regulations like GDPR, CCPA mean companies are also having […]


LastPass Says No Passwords Compromised in Security Scare …

But you should ditch that master password anyway. And it’s easier than you may think. Last week Tuesday, another security scare hit cyberspace and password manager LastPass. The scare points, once again, to the fact that passwords are risky. Several users reported receiving email alerts from LastPass, warning that unauthorized attempts had been made to […]


Face Verification: How It Optimizes Passwordless MFA?

How do you secure identity and transactions—especially business, financial, government transactions—in a world that is becoming more and more digital and hyperconnected? It’s time to move on from old and increasingly vulnerable authentication methods, like ID cards and the username-and-password combo, to newer methods that pose a tougher challenge for cybercriminals to get past.   Today’s […]


Let’s Discuss Account Takeover, or “ATO”. 

What can we do to better protect ourselves and our companies from account takeover?  Most of us today still believe we are “too small a fish” to have one of our digital accounts taken over. We think to ourselves that no one wants to read my email or post from my Twitter account or comment […]


HOW TO HACK A PASSWORD

Password Hacking or Cracking has evolved over the years, with instances of serious credential-based attacks topping headlines daily. Why? It’s become frighteningly easy for cybercriminals to get your password. Several high-profile attacks in recent news (SolarWinds, The US Pipeline … and so on) sparked an executive order from the White House calling for improved cybersecurity […]


BACK TO SCHOOL FOR CYBERCRIME WITH TRAITWARE.

Schools are top targets for Cybercrime. It’s time to get educated and educate about the risks, and how to implement a Zero Trust framework for security. With students of all ages still in the early days of their academic year, cybersecurity experts issue stern warnings about cybercrime in schools.  With the increased use of technology […]


BUSTING MYTHS: THE TRUTH ABOUT BIOMETRICS

FOR IDENTITY & ACCESS MANAGEMENT With cybercrime in today’s headlines almost daily, companies are looking to modernize security protocols. Biometrics are being widely adopted for greater security and for improved user experience. Yet some are still hesitant to make the shift. Here are a few myths about biometrics that need busting: 1. Biometric images can […]


What is Real Passwordless MFA?

What is Real Passwordless MFA and Why is it Essential for Enterprise Security? In light of the sharp rise in cyber attacks worldwide – from ransomware to phishing scams to man-in-the-middle attacks – we’ve been told by the likes of Microsoft, countless cybersecurity experts, and even the President of the United States, that it’s time […]