biid is a “mobile identity” platform that secures and protects banks and governments’ digital infrastructures while allowing their digital users to authenticate online, authorise transactions and sign legal documents quickly and easily, using their Android and iOS smartphones. When integrated into your Android and iOS Apps, our PKI-based technology transforms your customers’ smartphones into secure devices that can be used to verify their real identity and protect your systems against phishing and brute-force attacks. Our mobile SDKs have been designed to be extremely simple to integrate while, at the same time, enable great user experiences for performing operations like secure multi-factor authentications, transaction authorisations and document signings.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

CYBER-CRIMINALS LURE VICTIMS WITH CORONAVIRUS CURE CONSPIRACY THEORIES

Infosecurity | February 13, 2020

news image

Threat actors exploiting public interest in the ongoing coronavirus outbreak have baited their phishing traps with a new lure conspiracy theories about unreleased cures. The new tactic was noted by researchers at Proofpoint, who have been monitoring global malicious activity related to the life-threatening virus in the form of hundreds of thousands of messages. Alongside a flurry of phishing scams that hook victims with tall tales of secret remedies, researchers observed the emergence of campaig...

Read More

NEW JERSEY HOSPITAL NETWORK FACES LAWSUIT OVER RANSOMWARE ATTACK

Infosecurity | February 21, 2020

news image

A proposed class-action lawsuit has been filed against New Jersey's largest hospital health network over a ransomware attack that happened in December. Threat actors infected the computer systems of Hackensack Meridian Health, causing a system-wide shutdown on December 2. The attack disrupted services at 17 urgent care centers, hospitals, and nursing homes operated by the network. News of the attack was leaked to the media on December 5. Eight days later, Hackensack confirmed that it h...

Read More

ABNORMAL SECURITY FINDS PHISHING EMAILS DESIGNED TO SPOOF NOTIFICATION MESSAGES FROM MICROSOFT TEAMS

Microsoft | May 04, 2020

news image

Attackers are exploiting the surge in the use of Microsoft Teams in an attempt to trap unsuspecting users, says Abnormal Security. Since Microsoft Teams is linked to Microsoft 365 and Office 365, any credentials stolen in the scam could be used to sign in...

Read More

Enterprise Security, Platform Security, Software Security

GAMANIA GROUP IMPLEMENTS CYBERARK IDENTITY SECURITY PLATFORM TO PROTECT OVER 10 MILLION GAMERS, CUSTOMERS AND EMPLOYEES

Businesswire | May 19, 2023

news image

CyberArk (NASDAQ: CYBR), the global leader in Identity Security, announced today that Taiwan-based Gamania Group has implemented the CyberArk Identity Security Platform to strengthen its cybersecurity defenses. Gamania Group’s businesses span payment services, e-commerce, online media, original content and IT and serves over 10 million gamers, customers and employees. Gamania Group’s flagship business – Gamania, an online and mobile games publisher – deve...

Read More
news image

CYBER-CRIMINALS LURE VICTIMS WITH CORONAVIRUS CURE CONSPIRACY THEORIES

Infosecurity | February 13, 2020

Threat actors exploiting public interest in the ongoing coronavirus outbreak have baited their phishing traps with a new lure conspiracy theories about unreleased cures. The new tactic was noted by researchers at Proofpoint, who have been monitoring global malicious activity related to the life-threatening virus in the form of hundreds of thousands of messages. Alongside a flurry of phishing scams that hook victims with tall tales of secret remedies, researchers observed the emergence of campaig...

Read More
news image

NEW JERSEY HOSPITAL NETWORK FACES LAWSUIT OVER RANSOMWARE ATTACK

Infosecurity | February 21, 2020

A proposed class-action lawsuit has been filed against New Jersey's largest hospital health network over a ransomware attack that happened in December. Threat actors infected the computer systems of Hackensack Meridian Health, causing a system-wide shutdown on December 2. The attack disrupted services at 17 urgent care centers, hospitals, and nursing homes operated by the network. News of the attack was leaked to the media on December 5. Eight days later, Hackensack confirmed that it h...

Read More
news image

ABNORMAL SECURITY FINDS PHISHING EMAILS DESIGNED TO SPOOF NOTIFICATION MESSAGES FROM MICROSOFT TEAMS

Microsoft | May 04, 2020

Attackers are exploiting the surge in the use of Microsoft Teams in an attempt to trap unsuspecting users, says Abnormal Security. Since Microsoft Teams is linked to Microsoft 365 and Office 365, any credentials stolen in the scam could be used to sign in...

Read More
news image

Enterprise Security, Platform Security, Software Security

GAMANIA GROUP IMPLEMENTS CYBERARK IDENTITY SECURITY PLATFORM TO PROTECT OVER 10 MILLION GAMERS, CUSTOMERS AND EMPLOYEES

Businesswire | May 19, 2023

CyberArk (NASDAQ: CYBR), the global leader in Identity Security, announced today that Taiwan-based Gamania Group has implemented the CyberArk Identity Security Platform to strengthen its cybersecurity defenses. Gamania Group’s businesses span payment services, e-commerce, online media, original content and IT and serves over 10 million gamers, customers and employees. Gamania Group’s flagship business – Gamania, an online and mobile games publisher – deve...

Read More

Resources

resource image

Enterprise Security, Platform Security, Software Security

API Security: Best Practices for Vulnerability Mitigation

Whitepaper

resource image

none

Exam Action Plan

Whitepaper

resource image

Enterprise Identity, Platform Security, Software Security

Beyond Basics: Advanced Strategies for Enhancing Zero Trust Networking

Article

resource image

Enterprise Security, Platform Security, Software Security

API Security: Best Practices for Vulnerability Mitigation

Whitepaper

resource image

none

Exam Action Plan

Whitepaper

resource image

Enterprise Identity, Platform Security, Software Security

Beyond Basics: Advanced Strategies for Enhancing Zero Trust Networking

Article

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us