In The News

< 1 minute read
    CENTREVILLE, Va., Feb. 24, 2026 /PRNewswire/ — ID Dataweb™, a recognized leader in identity threat detection and risk mitigation, today announced it has been named a recipient of the 2026 SLED Industry Excellence (SLEDIE) Rising Star Award by e.Republic. The

    The latest from ID Dataweb

    • Media Coverage
    < 1 minute read
    ID Dataweb was featured in Cyber Security Asia for its alliance with SDG Corporation to deliver enterprise identity fraud prevention and advanced IAM solutions.
    • Press Release
    < 1 minute read
    VIENNA, Va., February 3, 2025 – ID Dataweb formed a strategic alliance with SDG Corporation to deliver advanced enterprise identity fraud prevention, combining identity verification with IAM expertise.
    • Media Coverage
    < 1 minute read
    ID Dataweb COO Matt Cochran authored a feature in Cyber Defense Magazine on knowledge-based authentication, exploring its role, risks, and best practices.
    • Media Coverage
    < 1 minute read
    ID Dataweb CEO David Coxe was featured in YourTechDiet’s ExtraMile interview, sharing insights on AI-driven fraud prevention, federated identity ecosystems, and the role of trust in innovation.
      < 1 minute read
      ID Dataweb won Best Fraud Prevention Solution at the 2024 Benzinga Fintech Awards, recognizing its leadership in securing digital identities and preventing fraud.
        3 minute read
        ID Dataweb won the “Security Orchestration Solution of the Year” award at the 2024 CyberSecurity Breakthrough Awards for its Attribute Exchange Network identity security platform.

        Recent case studies

        Case study

        A leading eCommerce giant reduced chargebacks to just 0.2%, earned $4.6 million in additional revenue, and achieved a 99.5% approval rate by integrating ID Dataweb’s identity verification with their AI-driven risk assessment.

        Case study

        Learn how the Fast Tap MFA solution slashes user friction while delivering a powerful defense against phishing, SIM swaps, and account takeovers.

        Case study

        See how healthcare providers are accelerating patient onboarding, achieving a 95% verification rate, and cutting costs with the new Light Verification solution from ID Dataweb and Ping Identity.

        Case study

        Rewards program fraud is costing the hospitality industry over $1 billion a year. Learn how ID Dataweb is helping security-forward organizations meet the challenge.

        Case study

        Eliminate account takeovers and synthetic identity fraud across every channel with ID Dataweb’s integrated verification engine.

        Case study

        Stop account takeover fraud using ID Dataweb’s integrated risk-based authentication and identity verification.

        The ID Dataweb Blog

        4 minute read
        Some of the most disruptive breaches in recent years began with nothing more than a compromised credential. Organizations that continue to focus primarily on perimeter controls and point-in-time authentication are defending against an outdated threat model.
        4 minute read
        When we talk about cyber threat intelligence in 2026, the perimeter that matters most is identity. Intelligence enterprises need to defend against identity-based attacks looks different from the traditional threat feeds most security operations centers rely on.
        4 minute read
        This blog examines how traditional identity verification and access management controls are increasing risk for state and local government agencies. It also explains how identity threat detection and risk mitigation can strengthen existing defenses and better protect public sector systems.
        4 minute read
        With compromised credentials now reported as the most common attack vector, Identity and Access Management (IAM) has become central to enterprise cybersecurity. This guide outlines 6 key considerations for an IAM program to succeed.
        3 minute read
        Authentication that relies on static personal information cannot stop modern account takeover chains. Organizations now need ongoing identity threat detection and risk mitigation layered around verification processes.
        3 minute read
        Stale credentials, outdated phone numbers, and orphaned accounts may be unglamorous, but they routinely undermine otherwise robust identity fraud and security defenses. Read more about the role of data hygiene in identity security.

        Secure your business today