top of page


Your Email Address Is Not Your Identity. You Just Think It Is.
The $15.6 billion mistake hiding in plain sight, and why fixing it starts with questioning the premise. Every morning, hundreds of millions of people prove who they are to their bank, their employer, their insurance company, their investment platform. They do it with the same mechanism they've used for decades: an email address and a password. The system sends a link. The link arrives. The system says: identity confirmed. Access granted. It sounds reasonable. It is, in fact,
Don Bush
6 hours ago4 min read


New Special Report: The Lying Gatekeeper
Despite not being designed for identity verification, email's convenience made it a common business identifier. Criminals target this pervasive use as a primary entry point for their activities. Read the newly published report, The Lying Gatekeeper, to explore these topics
Don Bush
Mar 182 min read


The Digital Identity Paradox: Why Email Verification is the New Security Frontier
In the modern digital economy, the email address has transcended its original purpose as a communication tool. It has become the near-universal unique identifier—the primary digital ID for billions of users. From financial services to SaaS products, the email address is the default gatekeeper for account creation, password resets, and high-value transactions. However, this reliance has created a dangerous security paradox: while email is treated as a permanent, trusted anchor
Don Bush
Feb 103 min read


The Rising Threat of Business Email Compromise
Cybercrime is evolving faster than ever, and Business Email Compromise (BEC) stands out as one of the most insidious threats. Unlike...
Don Bush
Aug 21, 20251 min read


The Achilles' Heel of Online Security: Why Passwords Leave Companies Vulnerable
In our digital-first world, passwords, combined with an email address or User ID, are the primary gatekeepers to vast amounts of...
Don Bush
Jun 25, 20253 min read


The Hidden Vulnerability: How Compromised Credentials Fuel Ransomware and Beyond
In today's interconnected digital landscape, the security of a company's sensitive data is only as strong as its weakest link. While...
Don Bush
Jun 11, 20254 min read


Email: More Dangerous than Ever
Most businesses and people assume email is secure. It is not. Every year millions of compromised email accounts are used by fraudsters....
Don Bush
Jun 4, 20253 min read


From Inbox to Outbreak: The BEC and FTF Epidemic
#emailfraud, #bec, #emailreputation
Grace Howard
May 14, 20253 min read


Is your Identity Solution Balanced? Prevention or Remediation
Balancing prevention & remediation is key in protecting against ATO. Choose the right mix to minimize risk & customer friction.
Justin McDonald
Nov 20, 20243 min read


Anatomy of Email Compromise
Protect your castle! Compromised emails put data & accounts at risk. Businesses using email for 2FA need a new approach. #cybersecurity
Karen Simmons
Oct 23, 20243 min read


myNetWatchman Cybersecurity Glossary
Whether you’re a professional, a business owner, or an end user, here are common cybersecurity terms you should know. 2FA Two-factor...
Grace Howard
Aug 28, 20241 min read
bottom of page
