From Featured News

Passwordless Authentication

Passwordless Access: The Future of Authentication?

Share Button

Nearly all data breaches start with compromised passwords. Whether it be through sophisticated phishing, brute force attacks, social engineering, or any other kind of credential harvesting, the password is the first, and sometimes only, line of defense against cyberattacks. Read more

Top 5 Banking Trojan Trends of 2018 (So Far)

Share Button

Banking Trojans are a type of malware frequently used to steal sensitive information such as banking credentials. Read more

Machine Learning Algorithms Explained - Support Vector Machines

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work Read more

Chatbots

When Chatbots are Fraudbots: Who Are Your Users Chatting With?

Share Button

Today’s fraud landscape presents a plethora of potential attack vectors, and criminals are always coming up with more.

Chatbots, a feature found on a variety of sites, present a new vector that has encouraged attackers to turn their attention to the profit potential of this well-meaning tool. Read more

Card Not Present

Card Not Present Fraud Is Still on the Rise: Can Anything Be Done?

Share Button

EMV was expected to help prevent fraud involving counterfeit credit cards. While the incidence of counterfeit card fraud has dropped, there has been a corresponding (and steady) rise in card not present fraud. Read more

Cyxtera

We Are Cyxtera!

Share Button

Just over a year ago, we announced the launch of Cyxtera Technologies, a new business that brought together a vast global data center footprint and a modern security portfolio from four separate companies, including the anti-fraud solutions from what was then Easy Solutions. Read more

Case Study: Transaction Security for a Non-Digital Organization

Share Button

In an increasingly digital age, both attacks and security are also increasingly digital. However, what about institutions that cannot digitize their transactions? Read more

Logistic Regression

Machine Learning Algorithms Explained - Logistic Regression

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work Read more

Video Blog: Victim Insights from Digital Threat Protection

Share Button

Organizations are constantly challenged to protect themselves against fraud, but lack the necessary intelligence to truly contextualize the impact of each individual threat.  Read more

Dark Web Scanning

Customer Success Story: How Scanning the Dark Web Has Changed Elements Financial’s Security

Share Button

Scanning the dark web for stolen credentials isn’t necessarily on the radar of every financial institution – but it should be. Read more