Digital Identity Blog

Thought leadership for cybersecurity, fraud and digital channel professionals

Featured Blogs and Insights from Cybersecurity Experts

Phantom Menace: Cybersecurity and the Bot Revolution

This is the first in a three-part series about bots. A Bot-pocalypse might be closer than you think. In her 2017 Internet Trends Report, Mary Meeker points out that, after a brief decline, traffic generated from bots has once again overtaken human-generated Internet traffic. And unfortunately, most of them are up to no good. From…

read more
Vanita Pandey
By Vanita Pandey Posted

NIST Digital Identity Guidelines: The Good and the Opportunity for Better

The National Institute of Standards and Technology (NIST) has long been an authoritative reference source for authentication assurance guidance. Its latest publication, “Digital Identity Guidelines,” is no exception. The guidelines update previous standards and extend them to address identity and authentication as a service, providing the concepts and language necessary for proper care and feeding…

read more
Aidan Herbert
By Aidan Herbert Posted

Spotlight Shines on Trust at the Digital Identity Summit EMEA 2017

Earlier this week, we convened more than 200 customers, partner and future customers for our first-ever Digital Identity Summit EMEA 2017: The Currency of Trust. This event, which took place at the London’s iconic Shard building, was part of the global Digital Identity Summit series. It featured digital, risk and fraud professionals from a dozen…

read more
Armen Najarian
By Armen Najarian Posted

Battling Fraud in Online Loan Applications

With so many online lending choices available, customers often submit applications with multiple lenders, then sit back and wait for the first lender to say “yes”. However, many of these online loan applications are submitted by fraudsters using stolen names, addresses, social security numbers, bank account numbers and more obtained from the dark web. This…

read more
Frank Teruel
By Frank Teruel Posted

The Right Approach to Deliver on the President’s Cybersecurity Executive Order

According to reports in USA Today, an astonishing 96 percent of all federal agencies rate themselves between “somewhat vulnerable” and “very vulnerable” to cyberattack. In fact, 65 percent have suffered a data breach in recent years — a full 34 percent just within the past 12 months. As homeland security advisor Tom Bossert said: “I…

read more
Armen Najarian
By Armen Najarian Posted

Understanding Australia’s New Payments Platform

The digital payments landscape is undergoing continuous transformation. The latest is in Australia with the New Payments Platform (NPP), which is expected to be operational in the second half of 2017. The goal of NPP is to provide consumers, businesses and government departments with a secure and efficient platform on which to make fast, versatile…

read more
Ted Egan
By Ted Egan Posted

The Rise in Social Engineering Fraud — And How to Stop It

Think preventing social engineering fraud is tough now? It’s only going to get tougher. As financial services organizations race to harden their defenses against cybercrime, their weakest link is suddenly getting a lot more dangerous — and costly. Call it your Achilles heel, or simply the human factor. Scams that exploit basic human psychology to…

read more
Alisdair Faulkner
By Alisdair Faulkner Posted

Cybercrime’s Seismic Shift: The Rapidly Evolving Global Threat Map

Breached identity data travels fast — sparking a sudden 35-percent increase in cyberattacks that are rapidly reshaping the global threat map, according to the Q1 2017 Cybercrime Report from ThreatMetrix. That amounts to more than 130 million attacks in just the first three months of the year. The report, based on actual attacks detected and…

read more
Vanita Pandey
By Vanita Pandey Posted

Case Management: Optimizing Manual Reviews at Scale for Fraud Prevention

In many organizations, fraud analysts are struggling to keep up with the ever-increasing number of events that require manual review. Throttling up policy thresholds for suspicious events — thus reducing the total number of cases flagged for review — is certainly one approach. But it’s nobody’s idea of a perfect solution. In addition, many organizations…

read more
Alisdair Faulkner
By Alisdair Faulkner Posted

WannaCry Was Just a Warning: Here’s What’s Coming Next—And How to Stop It

Well, that was close. The WannaCry cyberattack that crippled 200,000 businesses, government agencies and hospitals in 150 countries is now largely tamped down. The crisis was spawned by ransomware that first infected networked computers at Britain’s National Health Service before quickly spreading around the globe. In a matter of hours, it locked computers, encrypted files…

read more
Andreas Baumhof
By Andreas Baumhof Posted
1 2 3 78
Schedule A Demo Today
Schedule A Demo