Stytch Team

Stytch Talks with Brian Hale: rethinking user sign-up and login to unlock growth

Our first Stytch Talk webinar was all about optimizing user sign-up and login flows to drive key metrics like conversion rates, lower acquisition costs, and lifetime value. Earlier this month, Stytch’s co-founder and CEO Reed McGinley-Stempel sat down with Brian Hale, VP of consumer product and growth at DoorDash, to discuss how companies can turn …

Stytch Talks with Brian Hale: rethinking user sign-up and login to unlock growth Read More »

What is identity and access management (IAM)?

Identity and access management (IAM) is a broad term used to describe how organizations manage individuals and devices and control access to sensitive resources. With IAM, an organization can authenticate digital identities, define which assets they can access, and manage these relationships over time.  In an increasingly online world — with more users, more devices, …

What is identity and access management (IAM)? Read More »

How compromised passwords lead to data breaches

Data breaches have been in the headlines for several years, representing a rational fear for many organizations. A data breach is when someone — typically a hacker — gains unauthorized access to sensitive or confidential information. Hackers may do this for numerous reasons, including damaging the organization or its reputation, selling the retrieved data, or …

How compromised passwords lead to data breaches Read More »

Feathery turns to Stytch to launch their no-code forms and flows 

Peter Dun founded Feathery on the idea that creating online forms like surveys, applications, and in-app onboarding flows shouldn’t require separate teams of software engineers and product developers. He envisioned a simpler approach that would allow product teams to take direct ownership of their content without hand-coding and complicated buildouts. Feathery needed an easy, secure …

Feathery turns to Stytch to launch their no-code forms and flows  Read More »

Eliminate bot attacks from the CAPTCHA equation

Today, humans only make up 38.5% of internet traffic. The other 61.5% is non-human (bots, hacking tools, etc).  When you consider how pervasive non-human traffic is on the web and the potential threat this bot activity can pose to companies (brute forcing users’ passwords to steal their accounts, executing scripts to buy out concert tickets …

Eliminate bot attacks from the CAPTCHA equation Read More »

Multi-factor authentication: how to choose the right approach for your business

Multi-factor authentication (MFA) is a key tool for companies looking to elevate users’ account security, helping to mitigate credential stuffing attacks and prevent account takeover fraud. Sometimes used interchangeably with the term two-factor authentication (or 2FA), MFA involves a layered approach to confirming a user’s identity to ensure they have permission to access a protected …

Multi-factor authentication: how to choose the right approach for your business Read More »

Step-up versus multi-factor authentication (MFA)

Over the past decade, digital transformation has touched every part of our lives. Even companies that have historically provided analog services to users (e.g. shipping) have had to adjust to this digital transformation – that’s because consumers expect to be able to access and act upon information with the digital devices in their pockets and …

Step-up versus multi-factor authentication (MFA) Read More »

Stytch’s guide to adding passwordless options for password-based auth flows

Adding passwordless options to your password-based auth flow is a quick, seamless way to boost security and user engagement. At Stytch, we’re passionate about the power of frictionless, passwordless authentication, and we believe it’s the way of the future. But we also realize that each application and user base is unique, and not everyone is …

Stytch’s guide to adding passwordless options for password-based auth flows Read More »

What is password salting?

Passwords remain the most common method of user authentication. Yet, they’re not the most secure. One solution to certain security concerns with password authentication involves hashing, a form of one-way encryption that transforms one string of characters in a password into a completely different string using a mathematical hashing function.  To improve the safety of …

What is password salting? Read More »