How AI is predicting the future of online fraud detection

Bottom line: Combining supervised and unsupervised machine learning as part of a broader artificial intelligence (AI) fraud detection strategy enables digital businesses to quickly and accurately detect automated and increasingly complex fraud attempts.

Recent research from the Association of Certified Fraud Examiners (ACFE)

By Louis Columbus, 22 August 2019, 0 comments. Categories: Applications, Authentication, Employees, Security.

How global cybercrime is an ‘efficient and global’ operation – and what needs to be done about it

For Netscout, it is an inexorable trend. According to the company’s latest threat intelligence report, the dramatic rise in cybercrime activities – including nation-state APT (advanced persistent threat) groups, IoT vulnerabilities, DDoS and more – continues unabated.

The cybercrime business model has ‘matured into an efficient, global operation’, the company noted. The report, which tracked...

By Enterprise CIO, 08 August 2019, 0 comments. Categories: Authentication, Malware, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.

Why 74% of data breaches start with privileged credential abuse

Centrify’s survey shows organisations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials.

Enterprises who are prioritising privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In...

By Louis Columbus, 07 March 2019, 0 comments. Categories: Applications, Authentication, Security.

Hyperledger and Enterprise Ethereum Alliance team up to push forward enterprise blockchain

If blockchain technologies are going to seriously infiltrate the enterprise, then an endorsement from two leading industry players would not go amiss. The Enterprise Ethereum Alliance (EEA) has teamed up with Hyperledger to seemingly do just that.

The two bodies are chumming up by becoming associate members within each other’s organisations. This is somewhat interesting in itself; the EEA naturally aims to focus on...

By James Bourne, 02 October 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

How AI and machine learning can help detect and fight against cyberattacks

New research conducted by the Ponemon Institute argues that IT security teams need both a new approach and powerful new tools to protect data and other high-value assets, as companies struggle to fight against sophisticated cybersecurity attacks.

For this study, conducted on behalf of Aruba, a total of 4,000 security and IT professionals across the Americas, Europe and Asia were surveyed to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are required to...

By Enterprise CIO, 20 September 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

How Disney's ‘guestology’ theory for customer experience can improve IT support

It has been a few years now since Bruce Laval first coined the phrase ‘guestology’ for The Walt Disney corporation as a philosophy of how to maintain the ‘magic’ of the Walt Disney World resort.

A key factor of the theory is that what appears in front of the customer is always the finished product – all the characters and themes always in the right place and never seen in an area they should not be...

By Anthony Lamoureux, 17 August 2018, 0 comments. Categories: Authentication, Cloud , Employees.

Forget facial recognition: Let’s use AI to help gauge integrity

We’re hearing about more and more applications of AI-driven facial recognition systems, from checking identities at the airport to verifying board members for meetings. Taking things a step further, The Times reported recently that the Chinese city of Xinjiang has given its law enforcement officers Google Glass-like headsets equipped with facial...

By David Fulton, 06 June 2018, 0 comments. Categories: Authentication, Identity, Security.

It’s time to ditch the password – and start to appreciate the evolving needs of enterprises

Today, May 3, is World Password Day. It’s a ‘celebration’ to promote better password habits. We’ve long viewed the password as a critical gatekeeper to our digital identities, safeguarding our online shopping, banking, social media, sensitive data, and business communications.

But has the password had its day? Best practise recommends the use of complex passwords that include upper and lower case letters, symbols and numbers put together randomly. The password should be at a minimum 8...

By Ojas Rege, 03 May 2018, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.