top of page


Don Bush
Feb 123 min read
20
0


The Security Paradox: How to Protect Users Without Ticking Them Off
Login processes can make or break a user experience. Excessive reliance on multi-factor authentication (MFA) often deters users from...
Karen Simmons
Dec 4, 20243 min read
24
0


Is your Identity Solution Balanced? Prevention or Remediation
Balancing prevention & remediation is key in protecting against ATO. Choose the right mix to minimize risk & customer friction.
Justin McDonald
Nov 20, 20243 min read
18
0


New White Paper from The Fraud Practice and myNetWatchman Discusses Balancing Protection Against ATO with Preserving the User Experience
We provide an alternative perspective on the myth that 2FA makes user credentials secure so you don’t need to detect compromised credentials
Justin McDonald
Oct 30, 20242 min read
16
0


Anatomy of Email Compromise
Protect your castle! Compromised emails put data & accounts at risk. Businesses using email for 2FA need a new approach. #cybersecurity
Karen Simmons
Oct 23, 20243 min read
34
0


Anatomy of an FI Credential Stuffing Attack
Financial Institutions are not immune to credential stuffing. Here’s an example of an attack on an FI, its risk and success.
Karen Simmons
Sep 4, 20244 min read
40
0


myNetWatchman Cybersecurity Glossary
Whether you’re a professional, a business owner, or an end user, here are common cybersecurity terms you should know. 2FA Two-factor...
Grace Howard
Aug 28, 20241 min read
15
0
bottom of page