Monday, January 11, 2021

Integrating Fraud Data Into Your Workflow

Fraud detection solutions must be easily integrated into security and fraud operations.  I discuss some of the important points around this topic in my latest SecurityWeek piece: https://www.securityweek.com/integrating-fraud-data-your-workflow.

Thursday, January 7, 2021

Friction Affliction: How to Balance Security With User Experience

How can we balance security with user experience (UX) to reduce friction and increase revenue?  I discuss in my latest DarkReading piece: https://www.darkreading.com/edge/theedge/friction-affliction-how-to-balance-security-with-user-experience/b/d-id/1339836.

Wednesday, December 16, 2020

Detecting Fraud - Every Step of the Way

How important is looking at all of the evidence/data when working to detect and prevent fraud? I discuss in my latest SecurityWeek piece: https://www.securityweek.com/detecting-fraud-every-step-way.

Thursday, December 10, 2020

10 Ways Device Identifiers Can Spot a Cybercriminal

 What are 10 ways device identifiers can help security and fraud teams spot malicious or suspicious activity?  I discuss in my latest DarkReading piece: https://www.darkreading.com/edge/theedge/10-ways-device-identifiers-can-spot-a-cybercriminal/b/d-id/1339664.

Wednesday, December 2, 2020

Is Chasing Malware Really Helping You Reduce Fraud?

Is chasing malware really helping you reduce fraud?  I would venture to say that no, it is not.  I discuss why in my latest SecurityWeek piece: https://www.securityweek.com/chasing-malware-really-helping-you-reduce-fraud.

Monday, November 30, 2020

5 Signs Someone Might be Taking Advantage of Your Security Goodness

What are five signs someone might be taking advantage of your security goodness?  I discuss in my latest DarkReading piece: https://www.darkreading.com/edge/theedge/5-signs-someone-might-be-taking-advantage-of-your-security-goodness/b/d-id/1339542.  I hope you enjoy it.

Monday, November 2, 2020

What does bad advice look like?

What does bad advice look like?  How can we evaluate a piece of advice when we get it to know whether or not it is good advice?  I discuss in my latest SecurityWeek piece: https://www.securityweek.com/what-does-bad-advice-look.