
tru.ID expands to France to help eliminate the risk of password-related security breaches
tru.ID announced it has expanded to France and integrated with mobile network operators Orange, SFR, and Bouygues Telecom, adding over 50 million new users to the tru.ID …

tru.ID brings SIM-based authentication technology to mobile operator partners in Germany
tru.ID announced it is now integrated with mobile network operators Telekom, O2, and Vodafone, and opens up SIM-based authentication to businesses in Germany, adding over 80 …

Whitepaper: 5 steps to improved MFA adoption
5 steps to improved MFA adoption is an unbiased, comprehensive analysis of the present and future of multi-factor authentication, and challenges to widespread adoption. …

tru.ID launches SIM-based authentication services in India
Mobile verification platform tru.ID has launched in India to help digital banks, FinTechs, and e-commerce companies prevent identity fraud and secure transactions. In addition …

Passwordless verification API transforms every mobile phone into a security token for zero trust access
What is small, tamper-proof, cryptographically secure, and already used by 6.37 billion people? The SIM card. We carry this compact piece of secure tech everywhere without …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility