
Living On The Edge: Less Servers. Less Code. More Security.
We're excited to work with Cloudflare on a codeless way for companies to protect their online accounts and make it easier to implement strong security.
We're excited to work with Cloudflare on a codeless way for companies to protect their online accounts and make it easier to implement strong security.
Asking your consumers again and again to take responsibility for their security through robust passwords and other security measures doesn’t work. The responsibility of security needs to shift from end users to the companies who serve them
Companies have broken processes when it comes to notifying customers on compromised accounts. A new approach is needed.
How an organization handles an Account Takeover can have a significant impact on consumer trust and retention. Recently I became a victim and the response has made me re-think about my loyalty to this brand.
Get a solid understanding of the differences between attacks and anomalies that will allow you to create workflows that put the user first.
You need to know what’s going on inside and outside your applications to protect against Account Takeover. Here are the 4 stages of ATOs you need to know.
In 2015, Sebastian and I created Castle with a simple vision. We saw that it was increasingly difficult for companies
We are excited to share a new feature in the dashboard that is aimed to help make the Castle Integration more friendly and self service for developers!
At Castle, we are focused on building tools that power end-to-end user security alongside a frictionless user experience.
To actually prevent Account Takeovers you have to threat ATOs as a security threat not fraud.
Last week, Reddit announced a security incident in which an attacker compromised employee accounts for Reddit’s cloud and source code hosting providers. Breaches like this serve as reality checks to those of us responsible for securing user data and identities online.
One item that is commonplace in a hacker’s toolset is a database of leaked user credentials. The database holds a set of exposed user login credentials...