Blogs

[Whitepaper]: How Next-Gen Biometrics Can Better Protect Your Organization’s Mobile Transactions

The headlines blare almost daily about cybersecurity breaches, fraudulent transactions and identity theft. Today’s security professionals are under pressure on many fronts—including the vulnerability of our broken username and passcode system. That’s why advances in biometric technology such as fingerprint recognition authentication software solutions are seeing significant adoption rates. Banks, retailers, healthcare providers and other […]

Read more

The Internet of Things is Vulnerable to Cyberthreats

It is a sad state of affairs when even your child’s teddy bear is vulnerable to being hacked. But that’s what happened earlier this year when hackers were able to gain access to 2 million personal voice recordings captured by an internet-connected teddy bear. In this particular case, voice messages recorded by parents from their […]

Read more
Quorum Initiative - How

The 2017 Quorum Initiative: Observations from the Podium

While I don’t typically attend “women-only” conferences—primarily because the ones I participate in are technology events in which my business participates or meetings where I’m often the only woman in the room—I was recently asked to be a keynote speaker at an exceptional event in New York called The Quorum Initiative HOW Forum. It was […]

Read more

[Case Study] Leading Insurance Firm Exceeds Service Levels, Client Expectations with InAuth Browser Security Solution

We are pleased to share a new client success story with you. This one features a leading national insurance and financial planning firm that was unable to deliver the client experience they promised due to limitations with its legacy browser security solution. With a mission to deliver access to products and services almost entirely online […]

Read more

[InAuth Podcast]: How Fingerprint Biometrics Can Help Your Company Combat Fraud & Create a Frictionless Consumer Experience

There is no debate anymore—the username and password system of verifying users is broken. That is a key reason why the adoption of fingerprint biometrics is on the rise. Studies show that consumers are becoming increasingly comfortable with this authentication layer in the security equation. As such, businesses are looking to next-gen solutions to deliver […]

Read more

The Boston Fed Issues Latest Mobile Technology Report

The Federal Reserve Bank of Boston has recently published its latest report, “How Mobile Technology is Driving Innovation and Enhancing Payment Security.” Authored by Federal Reserve Bank of Boston, the report explores some of the key challenges and opportunities for mobile payments, including payment tokenization, the shifting emphasis to digital identity, IoT and a number […]

Read more

InAuth Launches InMobile Biometrics

InAuth is pleased to announce the launch of InMobile Biometrics—an enhancement adding biometric authentication to InMobile’s capabilities. This new enhancement combines powerful fingerprint technology with InAuth’s InMobile solution to deliver the first device identification offering with fully integrated and secure biometric recognition. InMobile Biometrics uses a device’s installed biometric reader to authenticate that the intended […]

Read more

Meet with InAuth at FS-ISAC in Orlando, April 30-May 3

InAuth will be a sponsor at the 2017 Financial Services Information Sharing and Analysis Center (FS-ISAC) Annual Summit, April 30-May 3, 2017. Join us in Orlando to explore how your organization can implement InAuth’s next-generation device intelligence solutions to combat fraud in the digital environment. We will be onsite to meet with you and discuss […]

Read more

[VIDEO] Digital Security and a Frictionless Customer Experience Are Possible

Mobile is transforming how consumers conduct their lives. People expect to bank, buy and consume from anywhere at any time of the day, with the least amount of friction possible. But cyber criminals are constantly evolving to infiltrate mobile and online channels. To mitigate against digital attacks, businesses must have real- time risk analysis and […]

Read more

Sign up to receive updates from InAuth about industry trends and technologies to protect your customers.

Sign me up!