How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud

Shir Levin used to report on government and law, but her journalism career wasn’t data-driven enough for her. She now uses her experience in news, psychology and statistics to fight identity fraud.

The post How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud appeared first on Security Intelligence.

Continue reading How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud

Where Do We Stand With Digital Identity Trust? Top 5 Findings From the ISMG Survey

When it comes to digital identity trust, many organizations still struggle to strike the right balance between security and the customer experience.

The post Where Do We Stand With Digital Identity Trust? Top 5 Findings From the ISMG Survey appeared first on Security Intelligence.

Continue reading Where Do We Stand With Digital Identity Trust? Top 5 Findings From the ISMG Survey

How to Deliver Frictionless Digital Trust With Pinpoint Accuracy

Companies that lack the resources to establish digital trust seamlessly, via a frictionless online experience, risk incurring high abandonment rates and low net promoter scores (NPS).

The post How to Deliver Frictionless Digital Trust With Pinpoint Accuracy appeared first on Security Intelligence.

Continue reading How to Deliver Frictionless Digital Trust With Pinpoint Accuracy

Why Device ID May Not Be Enough to Stop Fraud

To defeat increasingly sophisticated fraudsters, security teams should pair their fraud detection tools with a device ID spoofing mechanism that automatically adapts to new threats.

The post Why Device ID May Not Be Enough to Stop Fraud appeared first on Security Intelligence.

Continue reading Why Device ID May Not Be Enough to Stop Fraud

Grandma or the Wolf? Red Gets Smart About Fraud Protection

When Red spots suspicious activity on Grandma’s account, she needs a dynamic fraud protection tool to determine whether it’s really her or a Big Bad Wolf.

The post Grandma or the Wolf? Red Gets Smart About Fraud Protection appeared first on Security Intelligence.

Continue reading Grandma or the Wolf? Red Gets Smart About Fraud Protection

Uncover Omnichannel Fraud Faster

With so many ways to connect with banks today, financial organizations need omnichannel fraud detection tools to distinguish customers from fraudsters.

The post Uncover Omnichannel Fraud Faster appeared first on Security Intelligence.

Continue reading Uncover Omnichannel Fraud Faster

New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud

Banks and financial institutions require a dynamic strategy to identify emerging cybercrime trends and stop fraudsters in their tracks.

The post New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud appeared first on Security Intelligence.

Continue reading New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud

New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud

Banks and financial institutions require a dynamic strategy to identify emerging cybercrime trends and stop fraudsters in their tracks.

The post New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud appeared first on Security Intelligence.

Continue reading New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud

Phishing Attacks Collect 70 Percent of Credentials Within the First Hour

With new cognitive enhancements, IBM Trusteer Rapport can help financial institutions protect their customers from phishing attacks.

The post Phishing Attacks Collect 70 Percent of Credentials Within the First Hour appeared first on Security Intelligence.

Continue reading Phishing Attacks Collect 70 Percent of Credentials Within the First Hour

Phishing Attacks Collect 70 Percent of Credentials Within the First Hour

With new cognitive enhancements, IBM Trusteer Rapport can help financial institutions protect their customers from phishing attacks.

The post Phishing Attacks Collect 70 Percent of Credentials Within the First Hour appeared first on Security Intelligence.

Continue reading Phishing Attacks Collect 70 Percent of Credentials Within the First Hour