Welcome back to the Power of PushAuth™ blog series! The first post provided a comprehensive guide to push authentication — check it out here if you missed it. The next three...

Introduction I love building tech for other people to use. Unfortunately, I learned early on that if your application is accessible to users, it’s also vulnerable to...

Welcome to the first post in our series on PushAuth™, UnifyID’s push authentication service. This series, outlined below, will help you leverage push authentication to...

With the current password-based user authentication paradigm so loathed and cumbersome, a new study surveyed 1,000 consumers in the United States to better understand their...

In this paper, we would like to disseminate surprisingly positive results we obtained by using a framework for generating impostor features in the context of training...

On the Monday that I started interning, I remember being one of the first couple of people in the office, showing up at 9:30 in the morning. It was a very rare occurrence that...

HackMIT: Hack to the Future In the past couple of months, UnifyID has been busy attending university hackathons at MIT and UC Berkeley. What this means is hours and hours of...

I get mixed up with my friend Eric a lot. In the picture above, I’m on the left and Eric is on the right. We have similar builds, wear glasses, and although Eric will tell...

In my previous blog post “How I stopped worrying and embraced docker microservices” I talked about why Microservices are the bees knees for scaling Machine...

60 hours after I wrapped up my second year at UC Berkeley, I walked into the UnifyID office for my first day as a software engineering intern. I was not sure what to expect, but I...