Payment fraud remains a persistent problem in digital channels, hampered by fraud teams working in silos with narrow objectives.
This whitepaper by Gartner talks about how security and risk management leaders must exhibit cross-functional leadership to create fraud detection strategies that align closely with...
This Case Study is about a Large Financial Institution on how they accurately identified and blocked money mule accounts, as well as detected wider mule networks, while prioritizing a frictionless experience for legitimate customers.
Download this Case-Study and learn:
How to accurately identify and block...
This Case Study talks about DNP is a comprehensive printing company as they enhance risk decisioning as part of its 3DS workflow.
A reliable risk assessment can be given for online payments, regardless of whether this is the first time the card has been used, or when a 3DS security password has not been registered....
According to this survey conducted by Forrester it is seen that 56% of Organizations have experienced online fraud over the last 12 months.
Digital payments and digital commerce have penetrated emerging markets and the pandemic has only further accelerated the trend.
This survey talks about the intensity in which...
Although digital currencies have revolutionized the face of payments, investments, and banking, the heightened risk landscape that they operate on, brings together several features that cybercriminals value most.
This case study is about a digital currency exchange that allows users to buy and sell a variety of...
The Asia Pacific region has experienced a significant surge in online fraud due to the COVID-19 pandemic. Phishing, vishing, and smishing attacks have become rampant, with phishing attempts rising by 75% and vishing attacks increasing by 554%. Notably, bot attacks have risen by 135%. It is crucial for businesses in...
Securing these identities – both human and machine - requires greater collaboration and cooperation between IT & Security teams. In this webinar with industry experts, we will discuss various Identity Security strategies to navigate challenges and potential gaps to align to business goals.
The modern threat environment continues to evolve, with automation,
the move to the cloud, software as a service, AI, new user expectations
and increasingly sophisticated attacks from threat actors. How do we
cope with those changes today - and the certainty that there will be
new challenges tomorrow?
We do so by...
Organizations with a security-by-design approach need to go beyond being reactive to a proactive, offensive strategy to strengthen their security posture, says Mrutyunjay Mahapatra, member board of directors and chairman of the audit committee at Reserve Bank Innovation Hub.
Today’s global fraud outlook sits at the intersection of market volatility, accelerated digital transformation and consumer vulnerability. Cybercrime-as-a-service plug and
play technology tools are making it easier than ever for even unsophisticated fraud rings to launch and scale costly attacks.
The...
OneSpan plans to purchase an Australian startup founded by a longtime Quest Software executive to securely store and vault documents based on blockchain technology. Melbourne, Victoria-based ProvenDB uses blockchain to deliver security that prevents data tampering and document alteration.
In the latest update, four ISMG editors discuss important issues of 2022, including: CISO Marene Allison's unique career path; Ukrainian government cybersecurity official Victor Zhora on lessons learned from countering cyberattacks; and insights from CEO Nikesh Arora of Palo Alto Networks.
Multifactor authentication needs to move away from one-time passwords sent via text message and embrace modern standards that prevent man-in-the-middle attacks. Plus, excessive identity challenges online lead to 20% of e-commerce transactions being abandoned, say experts at Authenticate 2022.
Japanese conglomerate Hitachi has sold its small identity-as-a-service practice to Canadian software specialist Volaris Group to drive better execution around core products. The firm found it was easy to get lost within Hitachi given the conglomerate's size and focus on electronics and engineering.
Vikas Malhotra, country manager, LastPass, discusses establishing a password management program as the first line of defense in establishing user identity, followed by 2FA and MFA as the second step in the protection process.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.