Blog

Insights on identity verification and communication security.

Every Company Is a Target: Remote Hiring as an Attack Surface

Every company with remote roles, a payroll system, and VPN access is a viable target. DPRK IT worker operations don't target industries — they target hiring...

Claudia Regalado ·

Why DPRK IT Worker Schemes Succeed: They Operate as Organized Teams

North Korea's IT worker schemes succeed because they operate as organized teams, not lone actors. Learn how roles are divided, why traditional controls fail...

Claudia Regalado ·

How Hiring North Korean IT Workers Could Cost Your Company Millions

Standard due diligence is failing. Mid-cap companies hiring a single North Korean IT worker face $20 to $70M in combined sanctions penalties, breach costs, and...

Joshua McKenty ·

The Design Flaw in Identity Document Verification

AI-powered faceswapping has collapsed the barrier to document fraud. For $15 to $200, attackers can buy a faceswapped ID paired with a matching deepfake...

Joshua McKenty ·

Why Using Signal Doesn’t Solve Your Fraud Problem—And How Polyguard Does

Signal, WhatsApp, and even FaceTime can’t tell you who you’re actually talking to. That’s the real risk. Today’s fraud doesn’t happen in the message—it happens...

Joshua McKenty ·

How to Stop Hiring Fraud Before It Starts: Secure Your Interviews with Polyguard

Hiring fraud isn’t just a theoretical risk anymore—it’s a daily threat. With remote interviews becoming the norm, deepfakes and impersonators are slipping past...

Joshua McKenty ·

Outsmarting AI-Generated Audio

A near-perfect replica of your voice can be produced with just 30 seconds of recorded audio. What is the right way to combat this threat?

Joshua McKenty ·

The AI Detection Paradox

As AI detection technologies evolve, they inadvertently serve as training modules for generating more deceptive deepfakes.

Khadem Badiyan ·

DeepPhishing: The New Weapon in CyberCrime

Phishing attacks have increased by 3,000% in the past year, and are a major driver in the increasing cybercrime losses reported globally.

Joshua McKenty ·

A Proposed Policy Framework for Synthetic Media

Deepfakes aren’t a tech problem — they’re a policy problem. A real framework must cover the full lifecycle of media, from capture to distribution to claims of...

Joshua McKenty ·

The Case for Going Beyond Chain-of-Custody

Deepfakes can spark coups and fuel chaos — proving why media verification can’t rely on trust in any one company or nation. The answer lies in federated...

Joshua McKenty ·

The Case for Modular Media Verification

Shared reality can’t survive if everyone plays by different rules. A global media verification system must work for everyday smartphone users and for those...

Joshua McKenty ·