In The News

< 1 minute read

    CENTREVILLE, VA, January 20, 2026 – ID Dataweb today announced the appointment of industry veteran Dr. Torsten George as the company’s first Chief Marketing Officer (CMO). In this role, Dr. George will lead the company’s global marketing strategy, with a

    The latest from ID Dataweb

      2 minute read
      CENTREVILLE, Va., – October 31, 2025 – ID Dataweb’s cybersecurity evangelist, Dr. Torsten George, will headline a SecurityWeek webinar on November 5, 2025, sharing insights on the Scattered Spider cybercrime group and strategies to strengthen enterprise resilience.
      • Media Coverage
      < 1 minute read
      ID Dataweb COO Matt Cochran spoke with Hotel Business about defending hotels from Scattered Spider and loyalty fraud using identity threat detection and risk mitigation solutions that establish cross-channel digital trust.
      • Press Release
      < 1 minute read
      DENVER, Co., October 15, 2025 – The Prism Project recognized ID Dataweb as a 2025 Privacy and Compliance Luminary for enabling trusted, compliant data exchange through its federated identity verification architecture.
      • Press Release
      < 1 minute read
      CENTREVILLE, Va., October 7, 2025 – ID Dataweb VP Spencer Crane will speak on applying NIST IAL2 to strengthen digital trust at the 15th Annual Cyber Security Summit in Minneapolis.
      • Media Coverage
      < 1 minute read
      ID Dataweb and IDMWORKS launched a managed service integrating adaptive identity proofing into IAM operations to reduce fraud risk and secure third-party access.
      • Press Release
      < 1 minute read
      CORAL GABLES, Fla. and CENTREVILLE, Va., September 23, 2025 – ID Dataweb and IDMWORKS launched a managed service to secure third-party access, embedding adaptive identity proofing into IAM operations to reduce fraud risks.

      Recent case studies

      Case study

      A leading eCommerce giant reduced chargebacks to just 0.2%, earned $4.6 million in additional revenue, and achieved a 99.5% approval rate by integrating ID Dataweb’s identity verification with their AI-driven risk assessment.

      Case study

      Learn how the Fast Tap MFA solution slashes user friction while delivering a powerful defense against phishing, SIM swaps, and account takeovers.

      Case study

      See how healthcare providers are accelerating patient onboarding, achieving a 95% verification rate, and cutting costs with the new Light Verification solution from ID Dataweb and Ping Identity.

      Case study

      Rewards program fraud is costing the hospitality industry over $1 billion a year. Learn how ID Dataweb is helping security-forward organizations meet the challenge.

      Case study

      Eliminate account takeovers and synthetic identity fraud across every channel with ID Dataweb’s integrated verification engine.

      Case study

      Stop account takeover fraud using ID Dataweb’s integrated risk-based authentication and identity verification.

      The ID Dataweb Blog

      4 minute read
      Palo Alto Networks (PANW) announced its intent to acquire CyberArk, a leading Identity Security company. Identity Security has already been gaining momentum over the last year, and PANW’s acquisition further cements identity's central role in modern cybersecurity.
      5 minute read
      Regulators and enterprises are moving away from OTPs as a secure factor due to their weakness to SIM swaps, phishing and social engineering attacks. This article will explore why passkeys are now proliferating as an alternate second factor.
      6 minute read
      In the United States, around 35 million phone numbers are recycled each year. This article explores how recycled numbers enable account takeovers, then shows how ID Dataweb’s new MobileMatch risk signals address this issue.
      6 minute read
      Companies eager to fill tech roles and accustomed to interviewing candidates solely via Zoom or Skype have proven disturbingly easy to defraud. Shadow workers come into the interview process prepared with fabricated resumes and fake identities.
      5 minute read
      Scattered Spider does not begin with malware. It begins with a phone call. Their pattern is clear: find a support channel under deadline pressure, sound helpful, and request a credential reset that hands the keys to the attacker.
      7 minute read
      Even as enterprises have broadly adopted MFA for their workforces, attackers are finding ways around it. Protecting against threats to secure MFA enrollment, requires stronger identity verification and adaptive risk-based workflows.

      Secure your business today