Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud

Financial institutions seeking a piece of the hot P2P payments market must act to prevent network fraud with a multilayered prevention approach that includes a robust fraud detection engine.

The post Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud appeared first on Security Intelligence.

Continue reading Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud

Digital Identity Trust: A New Way to Authenticate

When building digital identity trust, security teams have historically struggled to find a balance between security and customer convenience. But what if they could have both?

The post Digital Identity Trust: A New Way to Authenticate appeared first on Security Intelligence.

Continue reading Digital Identity Trust: A New Way to Authenticate

3 Novel Ways to Use Blockchain for Business Across Industries

By leveraging blockchain for business, organizations can clarify historical records and streamline transactions while significantly boosting overall enterprise security.

The post 3 Novel Ways to Use Blockchain for Business Across Industries appeared first on Security Intelligence.

Continue reading 3 Novel Ways to Use Blockchain for Business Across Industries

Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience

Advanced authentication solutions can help mitigate the risk of fraud by detecting malicious activity without adding unwanted speed bumps to the online user experience.

The post Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience appeared first on Security Intelligence.

Continue reading Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience

Why Limor Golan Works Hard to Make Security Operations Easier

Limor Golan is a self-described hyperactive developer who works best under stress. Trusteer was so impressed they created a role specifically for her to improve security operations through automation.

The post Why Limor Golan Works Hard to Make Security Operations Easier appeared first on Security Intelligence.

Continue reading Why Limor Golan Works Hard to Make Security Operations Easier

The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion

IBM X-Force researchers observed the Necurs botnet spewing millions of spam emails from more than 30,000 malicious IPs to extort bitcoin from victims who may or may not have viewed adult content.

The post The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion appeared first on Security Intelligence.

Continue reading The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion

Signing Up for Benefits? Beware of Phishing Attacks

Over the next two months, companies should educate and test their employees to prepare for the rise in phishing attacks related to benefits enrollment and holiday party and charity campaign planning.

The post Signing Up for Benefits? Beware of Phishing Attacks appeared first on Security Intelligence.

Continue reading Signing Up for Benefits? Beware of Phishing Attacks

How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud

Shir Levin used to report on government and law, but her journalism career wasn’t data-driven enough for her. She now uses her experience in news, psychology and statistics to fight identity fraud.

The post How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud appeared first on Security Intelligence.

Continue reading How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud

Supporting the Shift to Passwordless Authentication With FIDO

IBM is embracing FIDO authentication across its offerings as part of its effort to shift the industry toward a standardized approach to authentication and the eventual end of passwords.

The post Supporting the Shift to Passwordless Authentication With FIDO appeared first on Security Intelligence.

Continue reading Supporting the Shift to Passwordless Authentication With FIDO

Understanding California’s Consumer Privacy Act: The ‘American GDPR’

Most companies still are not fully up to speed on GDPR compliance. Starting in 2020, they’ll have a whole new regulatory maze to navigate: California’s Consumer Privacy Act.

The post Understanding California’s Consumer Privacy Act: The ‘American GDPR’ appeared first on Security Intelligence.

Continue reading Understanding California’s Consumer Privacy Act: The ‘American GDPR’