
A Layered Approach to Bot Detection and ATO Prevention
Learn about two layers in user and account defense, and how deploying Castle gives you a single solution that improves security and reduces user friction.
Learn about two layers in user and account defense, and how deploying Castle gives you a single solution that improves security and reduces user friction.
Does reducing friction help a business grow? Can security teams take friction away from users and make authentication seamless? “High-grade security” coupled with “low to no friction” is the future of successful online engagement between companies and their users. This post explores those topics.
This post covers strategies for adding Castle's layer of bot detection and ATO prevention to your OIDC authentication flow, getting the best of both worlds. This is relevant for apps using an external identity provider, like Okta, Auth0, Amazon Cognito, Google, or Facebook.
Whether it's human intuition or machine learning, how do we go about discovering key insights when flooded with data? This post introduces some fundamental techniques of AI & machine learning to non-data scientists.
In this post, we'll take a look at three types of bot-generated mouse interactions and we'll discuss how these can be automatically detected. See if you can pick out the bot mouse movements from the human ones!
Jim Gochee has joined Castle as the new COO to help teams protect their customers with user-centric security & fraud prevention.
We're excited to reveal the latest evolution of Castle's brand! Read to learn about the journey and considerations that went into the design process, and get some first glimpses of our new look.
A technical analysis of Castle's performance in detecting and blocking a variety of credential stuffing attacks from Fall 2020.
Learn about essential aspects of GDPR, and how security vendors like Castle can provide tools that actually make it easier for app developers to adhere to fundamental GDPR regulations.
Castle Solutions Architect Aron Eidelman demonstrates Account Takeover tactics by attackers and new ways to outsmart them and protect your users.
Responsibility for protecting consumer identities crosses over many teams, but their metrics and goals vary greatly. How do you align teams to better secure users while optimizing your security investment with quick time to value?
See a live demo of two different credential stuffing attacks and learn how to prevent potential ATOs while maintaining a balance between trust, risk, and user experience.