Keshia Rose photo

Keshia Rose

Role

Senior Developer Evangelist

Keshia Rose Articles

Keshia Rose's Articles

Image for auth0 integration for ATO
October 10, 2024

Strengthening IAM login security against account takeovers

Step-by-step instructions on how to integrate Fingerprint with Auth0 to prevent account takeovers. Assess device risk, trigger MFA smartly, and confirm authenticated sessions.

Blog image for ATO implementation guide
October 3, 2024

Implementation guide: Preventing account takeover with Fingerprint

Learn how to implement Fingerprint to prevent account takeover in this step-by-step guide.

Prevent brute force attacks tutorial image
September 17, 2024

Tutorial: How to protect accounts from brute force attacks

See how Fingerprint's device intelligence can help you identify and block brute force attempts, ensuring accounts stay secure while minimizing friction for legitimate users.

Header image for ATO examples blog post
July 24, 2024

Account takeover examples to learn from — and how to prevent them

Learn how account takeover has impacted businesses in the real world, the precautions to take to prevent it, and the tools to detect it.

  • Account takeover
Security lessons learned from the Snowflake data breach
June 17, 2024

Security lessons learned from the Snowflake data breach

The Snowflake data breach exposed critical vulnerabilities. Learn how to enhance your business’ security measures without sacrificing user experience.

What is Bot-Driven Wire Transfer Fraud? How It Works and How to Prevent It
January 18, 2024

Bot-driven wire transfer fraud: How it works and prevention

Dive into bot-driven wire transfer fraud, exploring phishing, account takeovers, and prevention strategies.

Open Banking What it is, Its Benefits, Its Risk of Fraudulent Account Linking and How to Prevent It
December 14, 2023

Open Banking: Benefits, fraud risks, and prevention

Understand open banking, its differences from traditional banking, benefits, risks, and fraud prevention measures.

Social Engineering Keyboard
December 8, 2023

Social engineering: The guide to preventing attacks

Learn what social engineering is, technical solutions for detection, and preventive strategies with our comprehensive guide.

How to Stop Credential Stuffing Attacks
September 15, 2023

How to Stop Credential Stuffing Attacks

Learn to block automated attacks on your login page with our credential stuffing prevention API and source code.