In The News

< 1 minute read
    CENTREVILLE, Va., Feb. 24, 2026 /PRNewswire/ — ID Dataweb™, a recognized leader in identity threat detection and risk mitigation, today announced it has been named a recipient of the 2026 SLED Industry Excellence (SLEDIE) Rising Star Award by e.Republic. The

    The latest from ID Dataweb

    • Media Coverage
    < 1 minute read
    In Credit Union Times, ID Dataweb’s Head of Financial Services, Mark Dreux, outlines how credit unions can combat new forms of identity-related fraud by adopting continuous verification and adaptive trust models to detect real-time risk.
    • Press Release
    < 1 minute read
    CENTREVILLE, Va., – November 03, 2025 – ID Dataweb announced the appointment of longtime executive Brian Nimmo as its first Chief Strategy Officer, reinforcing the company’s focus on strategic growth and industry leadership in identity threat detection and risk mitigation.
      2 minute read
      CENTREVILLE, Va., – October 31, 2025 – ID Dataweb’s cybersecurity evangelist, Dr. Torsten George, will headline a SecurityWeek webinar on November 5, 2025, sharing insights on the Scattered Spider cybercrime group and strategies to strengthen enterprise resilience.
      • Media Coverage
      < 1 minute read
      ID Dataweb COO Matt Cochran spoke with Hotel Business about defending hotels from Scattered Spider and loyalty fraud using identity threat detection and risk mitigation solutions that establish cross-channel digital trust.
      • Press Release
      < 1 minute read
      DENVER, Co., October 15, 2025 – The Prism Project recognized ID Dataweb as a 2025 Privacy and Compliance Luminary for enabling trusted, compliant data exchange through its federated identity verification architecture.
      • Press Release
      < 1 minute read
      CENTREVILLE, Va., October 7, 2025 – ID Dataweb VP Spencer Crane will speak on applying NIST IAL2 to strengthen digital trust at the 15th Annual Cyber Security Summit in Minneapolis.

      Recent case studies

      Case study

      A leading eCommerce giant reduced chargebacks to just 0.2%, earned $4.6 million in additional revenue, and achieved a 99.5% approval rate by integrating ID Dataweb’s identity verification with their AI-driven risk assessment.

      Case study

      Learn how the Fast Tap MFA solution slashes user friction while delivering a powerful defense against phishing, SIM swaps, and account takeovers.

      Case study

      See how healthcare providers are accelerating patient onboarding, achieving a 95% verification rate, and cutting costs with the new Light Verification solution from ID Dataweb and Ping Identity.

      Case study

      Rewards program fraud is costing the hospitality industry over $1 billion a year. Learn how ID Dataweb is helping security-forward organizations meet the challenge.

      Case study

      Eliminate account takeovers and synthetic identity fraud across every channel with ID Dataweb’s integrated verification engine.

      Case study

      Stop account takeover fraud using ID Dataweb’s integrated risk-based authentication and identity verification.

      The ID Dataweb Blog

      4 minute read
      Some of the most disruptive breaches in recent years began with nothing more than a compromised credential. Organizations that continue to focus primarily on perimeter controls and point-in-time authentication are defending against an outdated threat model.
      4 minute read
      When we talk about cyber threat intelligence in 2026, the perimeter that matters most is identity. Intelligence enterprises need to defend against identity-based attacks looks different from the traditional threat feeds most security operations centers rely on.
      4 minute read
      This blog examines how traditional identity verification and access management controls are increasing risk for state and local government agencies. It also explains how identity threat detection and risk mitigation can strengthen existing defenses and better protect public sector systems.
      4 minute read
      With compromised credentials now reported as the most common attack vector, Identity and Access Management (IAM) has become central to enterprise cybersecurity. This guide outlines 6 key considerations for an IAM program to succeed.
      3 minute read
      Authentication that relies on static personal information cannot stop modern account takeover chains. Organizations now need ongoing identity threat detection and risk mitigation layered around verification processes.
      3 minute read
      Stale credentials, outdated phone numbers, and orphaned accounts may be unglamorous, but they routinely undermine otherwise robust identity fraud and security defenses. Read more about the role of data hygiene in identity security.

      Secure your business today