Menu Skip to content
  • .
  • Products
    • Products by Category
      • Detect Monitoring Service
      • Detect Safe Browsing
      • Detect Safe Browsing Clientless
      • DetectTA
      • DetectID
      • DetectID for Enterprises
      • DetectID Cloud
      • Mobile Application Fraud Protection Suite
      • DMARC Compass
      • Detect Safe Browsing Mobile SDK
    • Products by Technology
      • Total Fraud Protection ®
      • Digital Threat Protection
      • Safe Browsing for Any Environment
      • Clientless Malware Detection
      • Strong Authentication
      • Transaction Risk Monitoring
      • Cloud Authentication
      • Mobile Fraud Protection
      • Mobile Authentication
      • Email Authentication
      • Compromised Card Monitoring
      • Rogue Mobile Application Protection
      • Application Protection
  • Use Cases
    • Targeted Attack Protection
    • Unauthorized Access Detection
    • Email and Domain Spoofing Prevention
    • Stop Mobile Fraud
    • Account Takeover Fraud Protection
    • Insider and Privileged User Account Threats
    • New Account Fraud
    • Anti-Phishing Protection
    • Card-Not-Present (CNP) Fraud Prevention
    • Biometric Authentication
    • Cardless Cash Withdrawal
    • External Threat Protection
  • Services
    • DetectTA AI Fraud Assessment
    • Detect Professional Service
    • Detect Certified Training & Certification
    • Professional Security Services
    • Detect Web Application Security Scanning
    • PCI DSS Compliance Assessment
    • Look Back Analysis
    • Authentication Mechanism GAP Assessment
    • Transactional Point of Compromise Analysis
    • Look Forward Analysis
    • Support
  • Partners
    • Easy Solutions Partners
    • Partners Portal
  • Resources
    • White Papers and Reports
    • Webinars
    • Compliance & Regulations
    • Events and Trade Shows
    • Fraud Intelligence Map
    • DMARC Compass Explorer™
    • Video Hub
    • Swordphish
  • Company
    • Corporate Profile
    • Leadership Team
    • Industry Recognition
    • Alliances & Memberships
    • Newsroom
    • Careers
  • Contact Us
AI vs AI

AI vs AI – Can Predictive Models Stop the Tide of Hacker AI?

by Alejandro Correa Bahnsen, Chief Data Scientist
by Sergio Villegas, Data Scientist
by Ivan Torroledo, Data Scientist
by Luis David Camacho, Lead Data Architect
April 18, 2018
Amazon Pay by Selfie

Amazon Wants to Patent Pay by Selfie, but Technology Already Available Today

by Damien Hugoo, Director, Product Marketing
March 16, 2016

Amazon recently filed a patent for a process that would allow shoppers to make a purchase by taking a photo and/or video of themselves, also known as pay by selfie. Narcissistic? Perhaps.

Read more

RSA Conference 2016

RSA Conference 2016 Recap — Part II

by Claudio Deiro, Technical Product Manager
March 8, 2016

Though nothing will drive them away We can beat them, just for one day We can be Heroes, just for one day Heroes, 1977 Brian Eno, David Bowie Listening to the legendary David Bowie singing Heroes while everybody leaves the room will be the last, enduring impression of RSAC 2016. I’d like to think that, …

Read more

RSA Conference 2016

RSA Conference 2016 – Impressions Part I

by Claudio Deiro, Technical Product Manager
March 2, 2016

Almost 20 years later I’m in San Francisco again, immersed in the artificial atmosphere of the Moscone Center at RSA Conference 2016. For the first day I’ve chosen a set of introductory talks, the Security Basic track, to get the feeling of it and start from the beginning. The first speaker confirms it is the right …

Read more

biometric authentication

Simplifying and Enhancing Your Customer Security with Biometric Authentication

by Damien Hugoo, Director, Product Marketing
February 29, 2016

With TouchID, biometric authentication is becoming mainstream. Fingerprint authentication has shown quick adoption as one of the most convenient biometric factors,

Read more

EMV Implementation

More Vulnerable? Microsoft to End Support for Windows XP in UK ATM Machines

by Paul Wilson, Product Owner – DetectID & DetectTA
February 11, 2016

Last month, Microsoft ended support for embedded Windows XP in ATMs. This Windows XP operating system is still used in the majority of ATMs that deliver cash to customers around the world.

Read more

Cost sensitive predictive analytics

Evaluating a Fraud Detection Using Cost-Sensitive Predictive Analytics

by Alejandro Correa Bahnsen, Chief Data Scientist
January 26, 2016

A credit card fraud detection algorithm consists in identifying those transactions with a high probability of being fraudulent based on historical fraud patterns.

Read more

democratization of malware

The Democratization of Malware

by Javier Vargas, Product Owner – Detect Safe Browsing
January 18, 2016

The printing press was one of the earliest steps towards democratization of knowledge, allowing the acquisition and spread of knowledge among the masses, and not just the privileged elite.

Read more

FFIEC Issues Ransomware Alert

Sharp Rise in Ransomware Attacks – FFIEC Issues Alert

by Michael Lopez, Vice President of Operations – US, EMEA, & APAC
January 7, 2016

As I discussed in a recent blog post, the U.S. Federal Financial Institutions Examination Council (FFIEC) issued an alert in early November around

Read more

weakest link against fraud

What is the Weakest Link in Your Fight Against Fraud?

by German Patiño, Key Account Manager
December 10, 2015

The more things change, the more they stay the same. This age-old adage can certainly be applied to the realm of IT security where hackers continuously evolve their techniques to compromise their targets.

Read more

The 2016 Fraud Landscape Is a Scary Place: Top Fraud Predictions from the Experts at Easy Solutions

by Easy Solutions, Inc
November 26, 2015

It should come as no surprise that 2016 will be yet another ever-changing and complex year for those fighting electronic fraud. Attacks are getting more sophisticated, some will start to use

Read more

Posts navigation
Page 10 of 24« First«...89101112...20...»Last »

Subscribe to our Blog

Featured News

  • US Government Now Requiring Federal Agencies to Implement DMARC
  • Machine Vs Attacker: Using Machine Learning for Early Phishing Detection
  • Fraud Detection by Stacking Cost-Sensitive Decision Trees

Bloggers

  • Bloggers

Machine Learning Series

  • Machine Learning Algorithms Explained

Twitter

Tweets by @goeasysol
Contact Us  l   Privacy Policy   l   Legal Terms   l   Site Map
Follow Us TwitterFacebookLinkedinYoutube


Easy Solutions, Inc. All rights reserved.

 

Make: A WordPress template by The Theme Foundry