HYPR Blog

FEATURED POST

The Evolution of Identity and Multi-Factor Verification

Just as MFA arose to fight phishing and password attacks, multi-factor verification has emerged to combat social engineering and other modern identity threats. Learn all about MFV — how it works, why it's needed, and how to get it.
Card Thumbnail

TransUnion 2025 State of Omnichannel Fraud Report Insights

How Weak Identity Security Posture Affects Organizations  The report paints a clear picture: fraudst...
Read More Search
Card Thumbnail

What CIOs and CISOs Are Saying About Fake IT Workers: 4 Key Takeaways

Across private conversations with CISOs, CIOs, and heads of HR and identity, one issue continues to ...
Read More Search
Meet Doug McLaughlin: HYPR’s New SVP of Worldwide Sales

Meet Doug McLaughlin: HYPR’s New SVP of Worldwide Sales

You've been at HYPR for six years. Why is now the right time for this expanded role and for HYPR's n...
Read More Search
Card Thumbnail

Real-Time Browser Security with HYPR + Microsoft Edge for Business Int...

With enterprise browsers serving as the new gateways to critical business applications and data, org...
Read More Search
Card Thumbnail

The AI Forgery Epidemic: The Growing Threat of AI-Generated Fake Docum...

As CEO of HYPR, I spend a lot of time thinking about the future of identity security. And right now,...
Read More Search
Card Thumbnail

How Deterministic Identity Assurance Ends Probabilistic Security Flaws...

When Security Experts Get Phished Even the most seasoned cybersecurity professionals can fall victim...
Read More Search
Card Thumbnail

HYPR and IDEMIA Partner to Extend Smart ID Badge Security

Unlock Seamless Security: Combining Physical and Digital Access with HYPR and IDEMIA Your organizati...
Read More Search
Card Thumbnail

Top Passwordless Identity Assurance Trends for 2025

“The Renaissance Man” was attributed to Leonardo da Vinci because he symbolized the focus of the Ren...
Read More Search
Card Thumbnail

What is Identity Proofing?

Identity proofing, or identity verification, is the process of verifying that someone is who they sa...
Read More Search
Card Thumbnail

Beyond SMS: HYPR's Perspective on Gmail's Shift to QR Code Authenticat...

SMS-based, two-factor authentication (2FA) has long been a staple security measure for many online s...
Read More Search
Card Thumbnail

Prevent Lockouts & Security Gaps with HYPR Policy Simulation

Authentication policies in Identity and Access Management (IAM) are the bedrock of modern enterprise...
Read More Search
Card Thumbnail

Top Identity Verification Trends for 2025

Identity verification has emerged as a key component of modern enterprise security as rules tighten ...
Read More Search
How to thwart evilginx

Thwarting Evilginx Attacks on Microsoft Entra ID

Attackers continually refine their methods to compromise user identities and gain unauthorized acces...
Read More Search
Card Thumbnail

HYPR Featured Partner for YubiKey Bio Multi-Protocol Edition

Today Yubico announced the general availability of its YubiKey Bio - Multi-protocol Edition, which s...
Read More Search
Card Thumbnail

HYPR Unmasks a Fake IT Worker: North Korea Isn’t the Only Threat

Since 2022, the FBI and other agencies have been sounding the alarm about North Koreans posing as US...
Read More Search