In The News

< 1 minute read
    CEO Dave Coxe discusses the evolution of digital trust, rising identity threats, and how the company’s cross-channel approach is reshaping enterprise identity security.

    The latest from ID Dataweb

    • Press Release
    < 1 minute read
    CENTREVILLE, VA, November 17, 2025 – ID Dataweb has appointed industry veteran Mark Tringale as Chief Revenue Officer to accelerate adoption of its identity threat detection and risk mitigation platform while expanding global sales, partnerships, and customer growth.
    • Press Release
    < 1 minute read
    CENTREVILLE, VA, November 13, 2025 – ID Dataweb announced its integration with Microsoft Entra Verified ID, enabling organizations to validate user identities using digital credentials. The integration strengthens protection against account takeover and identity fraud, while improving end user experience.
    • Press Release
    2 minute read
    CENTREVILLE, Va., – November 4, 2025 – ID Dataweb Cybersecurity Evangelist Dr. Torsten George will speak at the Southern California Public Sector Cybersecurity Summit, offering insights on identity security and digital trust in government.
    • Media Coverage
    < 1 minute read
    In Credit Union Times, ID Dataweb’s Head of Financial Services, Mark Dreux, outlines how credit unions can combat new forms of identity-related fraud by adopting continuous verification and adaptive trust models to detect real-time risk.
    • Press Release
    < 1 minute read
    CENTREVILLE, Va., – November 03, 2025 – ID Dataweb announced the appointment of longtime executive Brian Nimmo as its first Chief Strategy Officer, reinforcing the company’s focus on strategic growth and industry leadership in identity threat detection and risk mitigation.
      2 minute read
      CENTREVILLE, Va., – October 31, 2025 – ID Dataweb’s cybersecurity evangelist, Dr. Torsten George, will headline a SecurityWeek webinar on November 5, 2025, sharing insights on the Scattered Spider cybercrime group and strategies to strengthen enterprise resilience.

      Recent case studies

      Case study

      A leading eCommerce giant reduced chargebacks to just 0.2%, earned $4.6 million in additional revenue, and achieved a 99.5% approval rate by integrating ID Dataweb’s identity verification with their AI-driven risk assessment.

      Case study

      Learn how the Fast Tap MFA solution slashes user friction while delivering a powerful defense against phishing, SIM swaps, and account takeovers.

      Case study

      See how healthcare providers are accelerating patient onboarding, achieving a 95% verification rate, and cutting costs with the new Light Verification solution from ID Dataweb and Ping Identity.

      Case study

      Rewards program fraud is costing the hospitality industry over $1 billion a year. Learn how ID Dataweb is helping security-forward organizations meet the challenge.

      Case study

      Eliminate account takeovers and synthetic identity fraud across every channel with ID Dataweb’s integrated verification engine.

      Case study

      Stop account takeover fraud using ID Dataweb’s integrated risk-based authentication and identity verification.

      The ID Dataweb Blog

      5 minute read
      Regulators and enterprises are moving away from OTPs as a secure factor due to their weakness to SIM swaps, phishing and social engineering attacks. This article will explore why passkeys are now proliferating as an alternate second factor.
      6 minute read
      In the United States, around 35 million phone numbers are recycled each year. This article explores how recycled numbers enable account takeovers, then shows how ID Dataweb’s new MobileMatch risk signals address this issue.
      6 minute read
      Companies eager to fill tech roles and accustomed to interviewing candidates solely via Zoom or Skype have proven disturbingly easy to defraud. Shadow workers come into the interview process prepared with fabricated resumes and fake identities.
      5 minute read
      Scattered Spider does not begin with malware. It begins with a phone call. Their pattern is clear: find a support channel under deadline pressure, sound helpful, and request a credential reset that hands the keys to the attacker.
      7 minute read
      Even as enterprises have broadly adopted MFA for their workforces, attackers are finding ways around it. Protecting against threats to secure MFA enrollment, requires stronger identity verification and adaptive risk-based workflows.
      6 minute read
      The challenge going forward is no longer whether a supplier might be your weakest link: it’s how to manage that risk proactively. This article explores why supply-chain attacks are surging, and what’s at stake for enterprises.

      Secure your business today