Welcome to the first post in our series on PushAuth™, UnifyID’s push authentication service. This series, outlined below, will help you leverage push authentication to...

With the current password-based user authentication paradigm so loathed and cumbersome, a new study surveyed 1,000 consumers in the United States to better understand their...

In this paper, we would like to disseminate surprisingly positive results we obtained by using a framework for generating impostor features in the context of training...

On the Monday that I started interning, I remember being one of the first couple of people in the office, showing up at 9:30 in the morning. It was a very rare occurrence that...

HackMIT: Hack to the Future In the past couple of months, UnifyID has been busy attending university hackathons at MIT and UC Berkeley. What this means is hours and hours of...

I get mixed up with my friend Eric a lot. In the picture above, I’m on the left and Eric is on the right. We have similar builds, wear glasses, and although Eric will tell...

In my previous blog post “How I stopped worrying and embraced docker microservices” I talked about why Microservices are the bees knees for scaling Machine...

60 hours after I wrapped up my second year at UC Berkeley, I walked into the UnifyID office for my first day as a software engineering intern. I was not sure what to expect, but I...

This summer we ran our largest internship program yet at UnifyID. We hosted an immensely talented group of 16 interns who joined us for 3 months, and there was never a dull...

Company Uses Behavioral and Environmental Factors, Not Passwords, to Identify Users SAN FRANCISCO, CA – August 1, 2017 – UnifyID is leading the development of an...