Using big data to fight fraud is a challenge for most organizations. Andreas Baumhof of ThreatMetrix explains how context-based authentication combines fraud and security to leverage the use of big data.
As Keith Alexander tells it, when he led the National Security Agency, he didn't exist. Alexander discovered that 'fact' after he retired on May 21 as director of the NSA and commander of the Cyber Command and began shopping to buy a new home.
A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
Faced with a vulnerability that exposes Microsoft's Internet Explorer Web browser to a zero-day exploit involved in recent targeted attacks, CISOs need to take prompt action, security specialists say. Learn the steps they recommend.
Following a data breach, sensitive information, including credit card data, is often sold through the underground economy. Security experts discuss why it's so difficult to shut down online criminal forums.
Ellen Richey of Visa, keynoter at the April 29 Fraud Summit San Francisco, outlines key card fraud-fighting trends for the year ahead, including the U.S.'s migration toward EMV, greater use of tokenization and heightened fraud detection.
In the wake of recent high-profile retail breaches, the PCI Security Standards Council is supporting a move toward chip card technology that conforms to the Europay, MasterCard, Visa Standard, says General Manager Bob Russo.
Analysts say it's easy to believe the Neiman Marcus data breach may be tied to attacks on Heartland Payments Systems Inc. and other entities. But tracking the crimes is one thing; prosecuting is quite another.