Why SlashID
Identity ProtectionBlogDocumentation
Why SlashID
Use Cases
Discover Identity RiskEliminate IAM DebtIdentity Threat Detection & ResponseIdentity Security Posture ManagementAutomate Compliance Gap AnalysisSecure Non-Human Identities & AI AgentsStop Phishing & Vishing AttemptsDiscover & Block Shadow AppsIdentity ProtectionBlogDocumentation

Blog

Product Releases

/ 7 Jan, 2026

SlashID × Teleskope: A New Partnership to Unify Identity and Data Security

Today, we're excited to announce a new partnership between SlashID and Teleskope, bringing together industry-leading identity security and data security in a seamless, intelligence-driven integration.

SlashID × Teleskope: A New Partnership to Unify Identity and Data Security

Product Releases

/ 7 Jan, 2026

SlashID × Teleskope: A New Partnership to Unify Identity and Data Security

Today, we're excited to announce a new partnership between SlashID and Teleskope, bringing together industry-leading identity security and data security in a seamless, intelligence-driven integration.

SlashID Team
SlashID Team

Compliance

/ 14 Sep, 2022

The Security and Regulatory Compliance Benefits of WebAuthn

The WebAuthn standard helps you stop phishing and account takeover (ATO) attacks while maintaining HIPAA and SCA compliance.

WebAuthn is significantly safer than passwords, due to the way the keys are stored and because it prevents credential stuffing and reuse attacks.

Vincenzo Iozzo
Vincenzo Iozzo

Security

/ 12 Sep, 2022

Phishing Attacks – WebAuthn to the rescue

Authentication token theft is on the rise, with the latest Uber breach demonstrating yet again the threat that it poses.

WebAuthn significantly reduces user experience friction and hence allows for more frequent authentication prompts, offsetting the need for long-lived tokens and significantly curbing the risk of phishing.

Vincenzo Iozzo
Vincenzo Iozzo
1 2 3 4 5 6 7

Ready to start a top-tier security upgrade?

Get in touch
Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Why SlashID
Identity Protection Use Cases
Identity Management

Resources

Blog Documentation

We use cookies to improve your experience. Read our cookie policy.