
Joining Castle to help protect your online identity
Jim Gochee has joined Castle as the new COO to help teams protect their customers with user-centric security & fraud prevention.
Jim Gochee has joined Castle as the new COO to help teams protect their customers with user-centric security & fraud prevention.
We're excited to reveal the latest evolution of Castle's brand! Read to learn about the journey and considerations that went into the design process, and get some first glimpses of our new look.
A technical analysis of Castle's performance in detecting and blocking a variety of credential stuffing attacks from Fall 2020.
Learn about essential aspects of GDPR, and how security vendors like Castle can provide tools that actually make it easier for app developers to adhere to fundamental GDPR regulations.
Castle Solutions Architect Aron Eidelman demonstrates Account Takeover tactics by attackers and new ways to outsmart them and protect your users.
Responsibility for protecting consumer identities crosses over many teams, but their metrics and goals vary greatly. How do you align teams to better secure users while optimizing your security investment with quick time to value?
See a live demo of two different credential stuffing attacks and learn how to prevent potential ATOs while maintaining a balance between trust, risk, and user experience.
While bad bots are usually a top priority for security teams, when they start interfering with SEO, they become a priority for marketing teams as well.
Defining your AX (attacker experience) is a data-driven approach to understanding the attacker mindset that makes security proactive, not reactive.
The Training Camp runs developers through the Castle basics: Get hands-on experience with Castle's APIs, a deeper understanding of Castle features and more!
Castle launches Identity-Aware Bot Detection! This new product addresses the increasing risk of automated bot attacks imitating legitimate human behavior.
Blog series #4 of 4: Attack Tactics that Increase Success Rates… Tactic #4: Why More is Better for Attackers Perpetrating ATO attacks