New report: Application fraud is a serious threat to financial institutions

One fraud executive interviewed for this report summarized the problem with application fraud in one phrase: “Identity is broken.”
The post New report: Application fraud is a serious threat to financial institutions appeared first on NuData Security.
Continue reading New report: Application fraud is a serious threat to financial institutions

Keeping employee data safe – no matter where they may be

how to secure wifi for remote work, working from home securely, security home network, secure wifi network, remote work security risks, work from home security best practices
The post Keeping employee data safe – no matter where they may be appeared fi… Continue reading Keeping employee data safe – no matter where they may be

Keeping employee data safe – no matter where they may be

how to secure wifi for remote work, working from home securely, security home network, secure wifi network, remote work security risks, work from home security best practices
The post Keeping employee data safe – no matter where they may be appeared fi… Continue reading Keeping employee data safe – no matter where they may be

Escaping the echo chamber: How to make cybersecurity accessible for all

We’ve all experienced digital growing pains in the era of COVID-19. Whether it’s ordering food delivery off a smartphone […]
The post Escaping the echo chamber: How to make cybersecurity accessible for all appeared first on NuData Security.
The post Es… Continue reading Escaping the echo chamber: How to make cybersecurity accessible for all

3 Cybersecurity Resolutions to Survive 2021

Predicting a global pandemic that reshaped how we interact with each other and our devices at a fundamental level […]
The post 3 Cybersecurity Resolutions to Survive 2021 appeared first on NuData Security.
The post 3 Cybersecurity Resolutions to Surviv… Continue reading 3 Cybersecurity Resolutions to Survive 2021

The not-so-obvious cost of fraud to your company’s bottom line

It’s no longer a matter of if your business data has been breached; it’s a matter of how much […]
The post The not-so-obvious cost of fraud to your company’s bottom line appeared first on NuData Security.
The post The not-so-obvious cost of fraud to yo… Continue reading The not-so-obvious cost of fraud to your company’s bottom line

IBM Named a Leader in ‘The Forrester Wave™: Risk-Based Authentication, Q2 2020’

In today’s hybrid multicloud environment, users expect to be able to access their work and personal resources from wherever they are, whenever they need them. With this expanded security perimeter, and especially considering this year’s tectonic shift in remote work, organizations need to be prepared with a distributed security strategy that incorporates principles like zero […]

The post IBM Named a Leader in ‘The Forrester Wave™: Risk-Based Authentication, Q2 2020’ appeared first on Security Intelligence.

Continue reading IBM Named a Leader in ‘The Forrester Wave™: Risk-Based Authentication, Q2 2020’

Can Authentication Negatively Impact the User Experience?

To improve the user experience without compromising security, organizations should evolve their risk-based authentication (RBA) strategy to one of trust-based authentication.

The post Can Authentication Negatively Impact the User Experience? appeared first on Security Intelligence.

Continue reading Can Authentication Negatively Impact the User Experience?

What Is Single Sign-On (SSO)?

The question “what is single sign-on?” is one we get asked a lot. To understand this solution, consider an analogy: “Imagine going to the mall, and at each store you must register with the store for your first purchase. Then, every time aft… Continue reading What Is Single Sign-On (SSO)?

Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication

Passwords have become an insecure and cumbersome form of authentication. Learn about risk-based multifactor authentication, an approach to access management that uses context to determine risk.

The post Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication appeared first on Security Intelligence.

Continue reading Beyond 2FA: Secure Your Critical Assets With Risk-Based Multifactor Authentication