The ID Dataweb Blog

3 minute read
  • Identity operations
  • News
Every October, Cybersecurity Awareness Month reminds leaders to take stock of the evolving threat landscape. In 2025, one trend is undeniable: identity is the frontline.

The Latest in Identity Security

  • Authentication
  • Fraud prevention
3 minute read
Artificial intelligence has unleashed a new wave of threats for enterprise cybersecurity teams. This article explores how adaptive authentication – particularly risk-based, step-up authentication – provides an effective countermeasure to AI-driven fraud.
  • Fraud prevention
  • Identity operations
  • Risk signals
4 minute read
Call center procedures designed for customer convenience can be exploited by attackers to circumvent MFA and other guardrails. Here's how identity-threat detection and risk mitigation secures the call center.
  • Fraud prevention
  • Risk signals
4 minute read
Document verification is a preventative control that mitigates account opening fraud. This guide will examine how it works, and explain how layered threat signals enhance document verification technologies.
  • Fraud prevention
  • Identity operations
4 minute read
High-profile events in recent years have seen tickets sell out within seconds, leaving most fans empty-handed. This guide examines scalping operations ad how multi-signal, layered identity threat detection can restore access to legitimate buyers.
  • Identity operations
  • News
4 minute read
As part of a broader federal effort, CISA released a playbook that gives agencies a clear roadmap for rolling out phishing-resistant MFA. Here's what private sector enterprises can learn from it.
  • Identity Access Management
  • News
4 minute read
Palo Alto Networks (PANW) announced its intent to acquire CyberArk, a leading Identity Security company. Identity Security has already been gaining momentum over the last year, and PANW’s acquisition further cements identity's central role in modern cybersecurity.

Recent case studies

Case study

A leading eCommerce giant reduced chargebacks to just 0.2%, earned $4.6 million in additional revenue, and achieved a 99.5% approval rate by integrating ID Dataweb’s identity verification with their AI-driven risk assessment.

Case study

Learn how the Fast Tap MFA solution slashes user friction while delivering a powerful defense against phishing, SIM swaps, and account takeovers.

Case study

See how healthcare providers are accelerating patient onboarding, achieving a 95% verification rate, and cutting costs with the new Light Verification solution from ID Dataweb and Ping Identity.

Case study

Rewards program fraud is costing the hospitality industry over $1 billion a year. Learn how ID Dataweb is helping security-forward organizations meet the challenge.

Case study

Eliminate account takeovers and synthetic identity fraud across every channel with ID Dataweb’s integrated verification engine.

Case study

Stop account takeover fraud using ID Dataweb’s integrated risk-based authentication and identity verification.

In the news

< 1 minute read
ID Dataweb and IDMWORKS launched a managed service integrating adaptive identity proofing into IAM operations to reduce fraud risk and secure third-party access.
< 1 minute read
CORAL GABLES, Fla. and CENTREVILLE, Va., September 23, 2025 – ID Dataweb and IDMWORKS launched a managed service to secure third-party access, embedding adaptive identity proofing into IAM operations to reduce fraud risks.
< 1 minute read
ID Dataweb VP Spencer Crane authored a feature in Hospitality Tech explaining how hotels can move beyond one-time logins to establish continuous digital trust.
< 1 minute read
ID Dataweb COO Matt Cochran authored a Hotel Online article on balancing cybersecurity with seamless service, highlighting zero trust and loyalty fraud protection.
< 1 minute read
ID Dataweb CEO David Coxe shares how hotels can defend loyalty programs, call centers, and vendor systems from cyber threats through identity verification.
< 1 minute read
ID Dataweb CEO Dave Coxe was featured on The Security Podcasts from Security Magazine, discussing how to make sound security decisions in chaotic environments.

Secure your business today