Blog

Because Developing is Only Half the Equation.

Recent Articles

The Death of Passwords: How Telephone Numbers are Reinventing Security

July 21, 2015 by Tony Jamous // Verify

Internet services are increasingly turning away from conventional forms of user identification and passwords and instead looking towards authentication via mobile phone, a measure that significantly increases security. Although businesses have not put all the mechanisms in place to effectively identify their users, it has become a critical threat they are now taking very seriously. […] Read more »

The Security Trend: Why Mobile Apps Should Move Toward OTPs

Today, security and a safe user experience are more important than ever. However, many mobile applications, e-commerce sites and online communities only require a simple username and static password for login and access. While this is convenient for users, these login credentials are easily compromised using techniques like phishing, keyboard logging and other methods of […] Read more »

5 Tips When Creating Two Factor Authentication

June 25, 2015 by Srivatsan Srinivasan // Verify

Multifactor authentication is not only becoming the norm (both Apple and Snapchat added two-factor authentication for their login processes), it’s becoming the law. Starting August 1, 2015, the European Banking Association (EBA) will require all European businesses to have strong customer authentication when collecting payments in online transactions, including a mandatory multi-factor authentication process in […] Read more »

1 2 3 12