- Cloud Communications
- Contact Centers
- Customer Support
- Giving Back
- User Acquisition
What are Botnets, and How Can Phone Verification Prevent Them?
Agile enterprises today need to guard against bulk account creation and spam, and botnets are often responsible for many ...
Nexmo Protects Customers by Ending Support for Legacy TLS Protocols
On the 10th of July 2018 at 10:00 BST, Nexmo will disable support of legacy TLSv1 and TLSv1.1 protocols ...
Never miss a post!
Subscribe to your preferred edition of Nexmo's next-generation communications blog to get the latest posts delivered to your inbox.Select Your Subscription Edition
Data Security in International Customer Messaging
Data security has always been a key concern for enterprises, but new regulations such as the GDPR have brought ...
How Nexmo Is Preparing for GDPR
Nexmo recently published a blog post explaining what GDPR compliance is, what it means for communications, and how our ...
How to Add Two-Factor Authentication (2FA) to Your Node.JS Web Apps
This tutorial is part of the “Getting Started with Nexmo APIs and Node.js” series. See links to prior tutorials ...
Top 6 Reasons to Use Mobile Phone Verification for Your Business
Companies are seeing an increase in security breaches due to spammers and scammers. These breaches can result in a ...
Phone Number Verification: A Stronger Alternative to Traditional Passwords
Consumers feel increasingly threatened by data breaches, and for good reason: 40 percent of internet users have been victimized ...
Adding Phone (SMS/TTS) and Biometric Verification to Your iOS Application
Two-factor authentication (2FA) adds an extra layer of security for users that are accessing sensitive information. There are multiple ...