biocatch blog

BioCatch is a cybersecurity company that delivers behavioral biometrics, analyzing human-device interactions
to protect users and data. See how our customers employ our cloud-based solution to proactively collect and
analyze more than 2000 behavioral parameters to authenticate users and identify cybersecurity threats.

4 Tactics Fraudsters Use to Defeat Device ID

Oct. 25, 2018 | Identity Proofing, Continuous Authentication, Cybersecurity | by BioCatch

Device ID was one of the first methods organizations used to prevent fraud and authenticate users. It’s still in widespread use, but device authentication isn’t nearly as strong an identity solution as many think.

Read More [fa icon="long-arrow-right"]

What Is Digital Identity? Building Trust in Our Digital World

Aug. 6, 2018 | Identity Proofing | by BioCatch

It’s incredibly easy to pretend to be someone you’re not online.

Read More [fa icon="long-arrow-right"]

How to Verify Identity Online: 6 Steps for an Identity Proofing Strategy

Jul. 6, 2018 | Continuous Authentication, Authentication, Identity Proofing | by BioCatch

Traditional online identity verification solutions are failing to stand up to today’s fraudsters. In 2016, more than 25% of identity theft fraud involved the use of stolen information to open new accounts.

Read More [fa icon="long-arrow-right"]

Why Device ID Is Not Identity

May. 24, 2018 | Identity Proofing, Authentication | by BioCatch

Businesses regularly use device identity for fraud prevention and to authenticate users. Browsing the web on your cell phone? These solutions collect information on your mobile provider, phone model, internet connection and other data to link your unique device back to you.

Read More [fa icon="long-arrow-right"]

Managing the Risk of Application Fraud with Behavior-Based Identity Proofing

May. 16, 2018 | Identity Proofing, Continuous Authentication, Behavioral Biometrics | by BioCatch

Our security walls aren’t as high as we think they are. There are holes, and cybercriminals know how to slip through them, undetected. Application fraud has become a number one problem for companies across all verticals. In 2016, more than 25% of identity theft fraud involved the use of stolen information to open new accounts.

Read More [fa icon="long-arrow-right"]

What Constitutes Digital Identity? Perspective from the K(NO)W Identity Conference

Apr. 9, 2018 | Identity Proofing, Authentication | by Frances Zelazny

I attended the K(NO)W Identity Conference last week, which has emerged in the last year as the premier event for the identity industry.

Read More [fa icon="long-arrow-right"]