Quantcast
Channel: Anti-Fraud – Speaking of Security – The RSA Blog
Browsing all 104 articles
Browse latest View live

Securing eCommerce Transactions without Losing Customers Part 2 – Behavioral...

In Part 1 of this series we looked at using risk-based authentication to prevent account takeovers like the ones that victimized Starbucks and Uber customers and help reduce fraud chargebacks. In this...

View Article


Securing eCommerce Transactions without Losing Customers Part 3 – 3D Secure

Part 1 of this series covered using risk-based authentication for account holders while Part 2 dove into behavioral analytics to reduce fraud chargebacks. In this post we will look at the strategic use...

View Article


Securing eCommerce Transactions without Losing Customers Part 4 – Mobile...

Through this series we have looked at reducing fraud chargebacks via risk-based authentication for account holders, behavioral analytics and 3D Secure. In this final post we will look at mobile...

View Article

Image may be NSFW.
Clik here to view.

Students – Be the Next Digital Universe Defender

It is that wonderful time of the year when our kids go back to school and new university students ponder if they enrolled into the right major.  My nephew has changed his major three times so far –...

View Article

Image may be NSFW.
Clik here to view.

“Underground-uate” Studies in Cybercrime

Summer is slowly coming to an end and that means students are preparing for a new set of courses as they head back to school. That is, if they are going to a traditional college or university. The...

View Article


Image may be NSFW.
Clik here to view.

Are Cybersecurity Enhancements Drowning in the New Rec Center?

The trusty Jansport you’ve used for years is dilapidated and it’s time to replace those three ring binders. Paper supplies to fresh bedding are filling up the trunk. Let’s not forget the full size...

View Article

My So-Called Digital Life

Like most, I have a very rich and fulfilling digital life. My smart phone is at hand 24×7 and I use apps to check weather and Facebook, bank, shop, scan real estate and even tell me if I have hung a...

View Article

Tokenization and E-commerce: The Silver Bullet We’ve Been Looking For?

As we work with customers to help advance their anti-fraud efforts in their online channels, we’ve increasingly been asked about the impact of tokenization – will it simplify security efforts, or even...

View Article


“I’m more than just my job!”

In this hectic, modern world, too often many people feel reduced to the sum of their professional responsibilities.  In a small way, this feeling is driven by our current IT methods to determine access...

View Article


Reducing Fraudulent Transactions during the Holiday Shopping Season with...

While it may seem a bit early to be addressing the holiday shopping season, the giant nutcrackers are already towering over the pumpkins at the mall so I figured it was fair game. So what can we expect...

View Article

Image may be NSFW.
Clik here to view.

Violinists to Biometrics – RSA Charge Outtakes

Actionable intelligence, anomalous patterns, 3rd platform transformation, readied response, mobile proliferation – just some of the thematic vernacular that characterized the hundreds of presentations,...

View Article

Thoughts on the Plane from the Cyber Education Conference- and Feeling Energized

I’m fresh off the National Institute for Cyber Education (NICE) Conference 2015, the premier gathering for academics, government and industry to advance cyber education. The mission of the conference...

View Article

A closer look at the PSD2 and Risk-Based Authentication

The 8th of October 2015 is the day that Europe took a major step towards adopting more secure online banking – the European Parliament formally adopted the revised Directive on Payment Services,...

View Article


Help Wanted: Growing the Pipeline of Cyber Talent

In my last blog post , I started a discussion on my experience at the National Institute for Cyber Education (NICE) Conference 2015. Here, I’ll give you actions and key ideas on how we can make a...

View Article

Image may be NSFW.
Clik here to view.

Browser Locked? Call This Number.

A new form of browser locker has recently surfaced.  Browser-lockers are websites or pop-ups that redirect the browser to a website that locks-up the browser.  The user is prevented from continuing any...

View Article


Image may be NSFW.
Clik here to view.

Authentication Choice… and Tractors

Do you take selfies? It’s not that hard to do isn’t it? Sure it can be embarrassing, both to watch people taking selfies (there is of course a great German word for that: “fremdschämen“) or taking a...

View Article

Image may be NSFW.
Clik here to view.

Friendly Fraud and How to Keep Parents Safe Online

I recently read a great blog which discusses a child’s journey through the digital universe.  If you are a parent, especially of a young child, I highly recommend it.  The digital world offers so many...

View Article


Amit Yoran’s Predictions for 2016

This year marked a strategic shift from a maniacal focus on prevention, toward greater balance on monitoring, detection, and response capabilities. It’s become cliché́ to say that breaches are...

View Article

What is the Deep (Dark) Web?

Billions of people use the web on a daily basis. However, most of them usually consume less than 5 percent of its content. This 5 percent is known as the Surface Web, the part of the web whose content...

View Article

Image may be NSFW.
Clik here to view.

The Economics of Identity Theft in the Dark Web

If you ever want to find a reason to boycott the Internet, just go work for a security vendor.  The digital universe is a scary place, and the cybercriminals who operate within it never cease to amaze...

View Article
Browsing all 104 articles
Browse latest View live