top of page


Karen Simmons
Dec 4, 20243 min read
The Security Paradox: How to Protect Users Without Ticking Them Off
Login processes can make or break a user experience. Excessive reliance on multi-factor authentication (MFA) often deters users from...
170


Justin McDonald
Nov 20, 20243 min read
Is your Identity Solution Balanced? Prevention or Remediation
Balancing prevention & remediation is key in protecting against ATO. Choose the right mix to minimize risk & customer friction.
160

Justin McDonald
Oct 30, 20242 min read
New White Paper from The Fraud Practice and myNetWatchman Discusses Balancing Protection Against ATO with Preserving the User Experience
We provide an alternative perspective on the myth that 2FA makes user credentials secure so you don’t need to detect compromised credentials
130

Karen Simmons
Oct 23, 20243 min read
Anatomy of Email Compromise
Protect your castle! Compromised emails put data & accounts at risk. Businesses using email for 2FA need a new approach. #cybersecurity
300

Justin McDonald
Oct 3, 20241 min read
Register for our Upcoming Webinar: User Credentials are Not Secured with 2FA Alone
Join us for our upcoming webinar October 23 at 1 PM ET/ 10 AM PT: User Credentials are Not Secured with 2FA Alone
340


Karen Simmons
Sep 4, 20244 min read
Anatomy of an FI Credential Stuffing Attack
Financial Institutions are not immune to credential stuffing. Here’s an example of an attack on an FI, its risk and success.
350


Grace Howard
Aug 28, 20241 min read
myNetWatchman Cybersecurity Glossary
Whether you’re a professional, a business owner, or an end user, here are common cybersecurity terms you should know. 2FA Two-factor...
150
bottom of page