All about auth

Stytch Talks with Brian Hale: rethinking user sign-up and login to unlock growth

Our first Stytch Talk webinar was all about optimizing user sign-up and login flows to drive key metrics like conversion rates, lower acquisition costs, and lifetime value. Earlier this month, Stytch’s co-founder and CEO Reed McGinley-Stempel sat down with Brian Hale, VP of consumer product and growth at DoorDash, to discuss how companies can turn …

Stytch Talks with Brian Hale: rethinking user sign-up and login to unlock growth Read More »

Go big or go home: why it’s never too early to think about enterprise

After working in B2B SaaS over the past decade-plus one of my favorite questions is, “Should we expand into enterprise sales?”  I love this question because it tests the scale of a company’s ambition, the clarity of their vision and the viability of their product. Those who can successfully bridge the gap from SMB to …

Go big or go home: why it’s never too early to think about enterprise Read More »

What is identity and access management (IAM)?

Identity and access management (IAM) is a broad term used to describe how organizations manage individuals and devices and control access to sensitive resources. With IAM, an organization can authenticate digital identities, define which assets they can access, and manage these relationships over time.  In an increasingly online world — with more users, more devices, …

What is identity and access management (IAM)? Read More »

How compromised passwords lead to data breaches

Data breaches have been in the headlines for several years, representing a rational fear for many organizations. A data breach is when someone — typically a hacker — gains unauthorized access to sensitive or confidential information. Hackers may do this for numerous reasons, including damaging the organization or its reputation, selling the retrieved data, or …

How compromised passwords lead to data breaches Read More »

what is totp

What is TOTP and why does it matter?

Time-based one-time passcodes (TOTP) are a type of multi-factor authentication (MFA) that leverages software authenticator apps (e.g. Google Authenticator, Authy, Microsoft Authenticator) to verify your identity. These authenticator apps supply a randomly generated code that changes every 30 seconds.  Time-based One-time Passcodes are generated using a shared secret (a random string of characters) and the …

What is TOTP and why does it matter? Read More »

The definitive guide to choosing a Customer and Identity Access Management (CIAM) solution

When it comes to customer identity and access management (CIAM), there are a lot of decisions to make. What features do you need? How will you integrate the solution into your existing infrastructure? Do you want to build or buy a CIAM platform? These are all important questions, but they can be difficult to answer …

The definitive guide to choosing a Customer and Identity Access Management (CIAM) solution Read More »

Eliminate bot attacks from the CAPTCHA equation

Today, humans only make up 38.5% of internet traffic. The other 61.5% is non-human (bots, hacking tools, etc).  When you consider how pervasive non-human traffic is on the web and the potential threat this bot activity can pose to companies (brute forcing users’ passwords to steal their accounts, executing scripts to buy out concert tickets …

Eliminate bot attacks from the CAPTCHA equation Read More »

Multi-factor authentication: how to choose the right approach for your business

Multi-factor authentication (MFA) is a key tool for companies looking to elevate users’ account security, helping to mitigate credential stuffing attacks and prevent account takeover fraud. Sometimes used interchangeably with the term two-factor authentication (or 2FA), MFA involves a layered approach to confirming a user’s identity to ensure they have permission to access a protected …

Multi-factor authentication: how to choose the right approach for your business Read More »

Step-up versus multi-factor authentication (MFA)

Over the past decade, digital transformation has touched every part of our lives. Even companies that have historically provided analog services to users (e.g. shipping) have had to adjust to this digital transformation – that’s because consumers expect to be able to access and act upon information with the digital devices in their pockets and …

Step-up versus multi-factor authentication (MFA) Read More »