My So-Called Digital Life
Like most, I have a very rich and fulfilling digital life. My smart phone is at hand 24×7 and I use apps to check weather and Facebook, bank, shop, scan real estate and even tell me if I have hung a...
View ArticleTokenization and E-commerce: The Silver Bullet We’ve Been Looking For?
As we work with customers to help advance their anti-fraud efforts in their online channels, we’ve increasingly been asked about the impact of tokenization – will it simplify security efforts, or even...
View Article“I’m more than just my job!”
In this hectic, modern world, too often many people feel reduced to the sum of their professional responsibilities. In a small way, this feeling is driven by our current IT methods to determine access...
View ArticleE2: The Maestro’s Score – Adagio with the Gate Keeper
Marty wound his way through the cube farm housing a major portion of MagnaCorp’s technology staff. Row after row of cubicles housed techies clacking away at keyboards, talking quietly into headsets or...
View ArticleE2: The Maestro’s Score – Dance of the Foe
Marty slumped in the chair in the conference room and dejectedly paged through his notebook. He couldn’t focus on this own scribbles. He merely hoped that something would jump off the page at him...
View ArticleWe are the World – Internet of Things, Mobile and Social Media
October is National Cyber Security Awareness month (NCSAM), sponsored by StaySafeOnline.org to help remind us all to do our part to make the internet safer and more secure for everyone. Although that...
View ArticleE2: The Maestro’s Score – The Crescendo
The cloaks that the Hunter had confiscated from the men lay in the corner of the Mentor’s cabin. They had been summarily cut to ribbons but the Hunter’s intuition, and the Cat’s exhaustive inspection,...
View ArticleHow a Selfie or Finger Swipe Can Help Prevent Mobile Fraud
RSA is delighted to announce the availability of RSA Adaptive Authentication Mobile SDK 3.0 and with it our agreement with EyeVerify, the creator of Eyeprint ID™. RSA’s Adaptive Authentication Mobile...
View ArticleE2 – The Maestro’s Score – Technical Dialogue
In Episode 2 “The Maestro’s Score”, the Hunter digs deeper into the nefarious plot being composed by the Maestro. After identifying a shadowy band of men stalking key locations in the Kingdom, the...
View ArticleDigital Universe CyberSecurity Student Defenders in Action
After writing my blog about Students – Be the Next Defenders of the Digital Universe I received several inquiries about what RSA’s Anti-fraud Command Center does and how Purdue University works with...
View ArticleReducing Fraudulent Transactions during the Holiday Shopping Season with...
While it may seem a bit early to be addressing the holiday shopping season, the giant nutcrackers are already towering over the pumpkins at the mall so I figured it was fair game. So what can we expect...
View ArticleViolinists to Biometrics – RSA Charge Outtakes
Actionable intelligence, anomalous patterns, 3rd platform transformation, readied response, mobile proliferation – just some of the thematic vernacular that characterized the hundreds of presentations,...
View ArticleThoughts on the Plane from the Cyber Education Conference- and Feeling Energized
I’m fresh off the National Institute for Cyber Education (NICE) Conference 2015, the premier gathering for academics, government and industry to advance cyber education. The mission of the conference...
View ArticleA closer look at the PSD2 and Risk-Based Authentication
The 8th of October 2015 is the day that Europe took a major step towards adopting more secure online banking – the European Parliament formally adopted the revised Directive on Payment Services,...
View ArticleHelp Wanted: Growing the Pipeline of Cyber Talent
In my last blog post , I started a discussion on my experience at the National Institute for Cyber Education (NICE) Conference 2015. Here, I’ll give you actions and key ideas on how we can make a...
View ArticleBrowser Locked? Call This Number.
A new form of browser locker has recently surfaced. Browser-lockers are websites or pop-ups that redirect the browser to a website that locks-up the browser. The user is prevented from continuing any...
View ArticleAuthentication Choice… and Tractors
Do you take selfies? It’s not that hard to do isn’t it? Sure it can be embarrassing, both to watch people taking selfies (there is of course a great German word for that: “fremdschämen“) or taking a...
View ArticleFriendly Fraud and How to Keep Parents Safe Online
I recently read a great blog which discusses a child’s journey through the digital universe. If you are a parent, especially of a young child, I highly recommend it. The digital world offers so many...
View ArticleAmit Yoran’s Predictions for 2016
This year marked a strategic shift from a maniacal focus on prevention, toward greater balance on monitoring, detection, and response capabilities. It’s become cliché́ to say that breaches are...
View ArticleSecuring eCommerce Transactions without Losing Customers Part 1 – Risk-Based...
Yesterday afternoon I received one of the calls we all dread – my credit card company phoned to ask if my husband had purchased airline tickets within the last five minutes. Alas he wasn’t planning to...
View Article