top of page

New Special Report: The Lying Gatekeeper

  • Don Bush
  • 2 days ago
  • 2 min read

Despite not being designed for identity verification, email's convenience made it a common business identifier. Criminals target this pervasive use as a primary entry point for their activities. Read the newly published report, The Lying Gatekeeper, to explore these topics:

  • A Convenient Lie

    • How email, a messaging protocol built in 1971, became the de facto identity layer for the digital economy, and why that decision was never as safe as it seemed.

  • The Four Jobs Email Was Never Supposed to Have

    • The four critical identity functions that email has been pressed into serving: universal username, account recovery, action approval channel, and persistent proof of identity over time.

  • Trust That Expires the Moment It's Granted

    • Why email-based identity verification is a point-in-time check on a dynamic threat landscape, and how attackers exploit the gap between account creation and today.

  • The Cost of Static Trust

    • The measurable financial consequences of treating an email address as a permanent identity signal, including a $5M average cost per account takeover breach.

  • The Numbers Behind the Comfortable Myth

    • A data-driven look at the scale of account takeover fraud, credential stuffing, phishing, and synthetic email abuse, and how email sits at the center of each threat.

  • The Credential Reuse Epidemic

    • How password reuse across services turns a single breach into cascading exposure, feeding email-based credential stuffing attacks at industrial scale.

  • The Password Reset: Email's Most Dangerous Feature

    • Why email-based password recovery, used by 64% of services as the sole option, functions as a skeleton key for attackers who control a victim's inbox.

  • Why Businesses Keep Using It Anyway

    • The economic and inertial forces that keep organizations dependent on email as an identity signal, even as the evidence of its failure accumulates.

  • The MFA Paradox

    • Why multi-factor authentication hasn't solved the underlying problem when most MFA flows are themselves rooted in the same compromised email addresses.

  • The Disposable Address Problem: Email You Can't Trust From the Start

    • How the $1.36B disposable email industry enables account fraud from the moment of registration, and why standard validation tools can't detect it.

  • The Abandoned Account: A Skeleton Key That Never Expires

    • How dormant accounts accumulate in every user database, linked to email addresses that have changed hands, and how criminals exploit that invisible drift.

  • The Case Studies That Should Have Changed Everything

    • Documented, publicly reported failures, from Roku to Norton to Business Email Compromise, that illustrate the predictable cost of trusting email as identity.

  • From Static Trust to Continuous Intelligence

    • What a better approach looks like: shifting from one-time email validation to continuous risk assessment at every high-stakes moment in the account lifecycle.

  • Closing the Weakest Link

    • How organizations should rethink email risk, and how myNetWatchman Email Reputation was built to solve account takeover fraud and fake account creation at scale.

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page