In The News

< 1 minute read
    CENTREVILLE, VA, March 31, 2026 – ID Dataweb™️, a leader in identity threat detection andrisk mitigation, today announced the results of a new survey conducted in partnership with CIODive’s Studio by Informa TechTarget

    The latest from ID Dataweb

    • Press Release
    < 1 minute read
    CENTREVILLE, Va., March 25, 2026 /PRNewswire/ -- ID Dataweb™️, a leader in identity threat detection and risk mitigation, today announced that it has received the 2026 Silver Cybersecurity Excellence Award in the Identity Threat Detection and Response category.
    • Press Release
    < 1 minute read
    CENTREVILLE, Va., March 10, 2026 /PRNewswire/ -- ID Dataweb™️, a leader in identity threat detection and risk mitigation, has been named a finalist in the 2026 SC Awards in the Best Identity Management Solution category. This recognition places the company
    • Press Release
    < 1 minute read
    CENTREVILLE, Va., Feb. 24, 2026 /PRNewswire/ — ID Dataweb™, a recognized leader in identity threat detection and risk mitigation, today announced it has been named a recipient of the 2026 SLED Industry Excellence (SLEDIE) Rising Star Award by e.Republic. The
    • Press Release
    < 1 minute read
    CENTREVILLE, VA, February 10, 2026 – ID Dataweb today announced that it has once again achieved SOC 2 Type II attestation for the ID Dataweb platform, reaffirming the company’s commitment to the highest standards of security, availability, and confidentiality.
      < 1 minute read

      CENTREVILLE, VA, January 20, 2026 – ID Dataweb today announced the appointment of industry veteran Dr. Torsten George as the company’s first Chief Marketing Officer (CMO). In this role, Dr. George will lead the company’s global marketing strategy, with a

      • Media Coverage
      < 1 minute read
      CEO Dave Coxe discusses the evolution of digital trust, rising identity threats, and how the company’s cross-channel approach is reshaping enterprise identity security.

      Recent case studies

      Case study

      A leading eCommerce giant reduced chargebacks to just 0.2%, earned $4.6 million in additional revenue, and achieved a 99.5% approval rate by integrating ID Dataweb’s identity verification with their AI-driven risk assessment.

      Case study

      Learn how the Fast Tap MFA solution slashes user friction while delivering a powerful defense against phishing, SIM swaps, and account takeovers.

      Case study

      See how healthcare providers are accelerating patient onboarding, achieving a 95% verification rate, and cutting costs with the new Light Verification solution from ID Dataweb and Ping Identity.

      Case study

      Rewards program fraud is costing the hospitality industry over $1 billion a year. Learn how ID Dataweb is helping security-forward organizations meet the challenge.

      Case study

      Eliminate account takeovers and synthetic identity fraud across every channel with ID Dataweb’s integrated verification engine.

      Case study

      Stop account takeover fraud using ID Dataweb’s integrated risk-based authentication and identity verification.

      The ID Dataweb Blog

      4 minute read
      SMS is universal. But attackers have mapped every seam in that path—and they are exploiting them faster than most security teams can respond.
      5 minute read
      Account takeover attacks do not succeed only because bad actors defeat authentication. They are path attacks. They succeed because organizations still defend identity as a series of separate checkpoints, while attackers exploit the disconnection between them.
      4 minute read
      Addressing cybersecurity vendor sprawl is challenging because it typically results from reasonable decisions made under real constraints. Too much complexity reduces visibility. The strongest response is neither blind consolidation nor endless best-of-breed expansion, but architectural discipline.
      5 minute read
      A phone number is not a stable identity object. It can be ported or SIM-swapped. Phone-based authentication is still important, but mature identity threat detection should treat the phone as a context source, not a verdict.
      5 minute read
      Phishing-as-a-service has turned identity abuse into a supply chain. Attackers no longer need deep technical skills to run phishing infrastructure. For defenders, keeping pace is difficult without visibility across the entire identity ecosystem.
      3 minute read
      Effective document fraud detection requires layered defenses. Only through risk signal correlation can enterprises move beyond false confidence and achieve measurable fraud reduction.

      Secure your business today