• About
  • Join Us
  • Contact
  • Resources
How is Continuous Authentication Different from Two-Factor Authentication?

How is Continuous Authentication Different from Two-Factor Authentication?

by Árni S. Pétursson | Sep 20, 2023 | Publication

In today’s digital world, securing your business data and sensitive information is paramount. Instances of high profile data breaches are more rampant than ever, while the technology used to bolster against attacks range from less than ideal to completely...
Rethinking the Future of Continuous Authentication

Rethinking the Future of Continuous Authentication

by Árni S. Pétursson | Jul 13, 2023 | Publication

Imagining continuous authentication as it should be: 3 short stories I spend a large part of my day authenticating: simply proving that I am (still) me. It’s annoying and highly inconvenient. I’m sure you agree. Whether it be standard MFA or biometrics,...

Keystrike neutralizes spear phishing. Without friction.

Keystrike is part of the Berkeley SkyDeck accelerator program (Batch 16 IPP).

The square logo for Berkeley's Skydeck  Accelerator.
  • About
  • Join Us
  • Contact
  • Resources

©️ 2023 Keystrike Inc.

United States Patent Application No. 63/330,875: Devices, Systems and Methods for Securing Communication Integrity.
Provisional patent: US Patent Office certifies an official filing date (April 2022) on our invention, preempting other applicants from patenting it in a “first-to-file” fashion. Full patent application was filed in April 2023.

Privacy notice