Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Frictionless Fraud Prevention: Stopping Fraud Without Adding Friction Daryl Huff, VP Advanced Development at Jumio Fraud attack sophistication is constantly evolving and increasing, putting businesses at risk. The Association of Certified Fraud Examiners and Grant ... March 28, 2023 6:00pm Accelerate Digital Trust: The Power of End-to-End Identity Proofing Platforms David Mattei - Aite-Novarica Group; Santosh Rajvaidya, Simon Winchester, Samer Attasi Nearly 90% of businesses have seen higher fraud losses since the pandemic began, most coming from online customer onboarding. But fraud doesn’t stop a... 4 weeks ago | 59 mins State of Machine Identity Management Chris Hickman, Chief Security Officer, Keyfactor; Ryan Sanders, Senior Director of Product & Customer Marketing For the third consecutive year, Keyfactor and The Ponemon Institute have collaborated on the State of Machine Identity Management report —an in-depth ... March 23, 2023 4:00pm Hidden Cloud Security Challenges Are a Barrier to Zero Trust Murali Palanisamy, Chief Solutions Officer, AppViewX Digital transformation projects continue to push more business critical applications, services and workloads to the cloud. While this progress helps f... March 21, 2023 6:00pm Decentralised Identity: Giving Control Back to the Consumer Mary Jane Dykeman, INQ Law | Tod Beardsley, Rapid7 In an age of the digital footprint, where data is being produced at such a rapid pace that we almost can’t keep up, decentralised identity offers an e... 5 days ago | 57 mins Cyber Notes Cast - How to Manage Privileges in Endpoints? senhasegura If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tabl... March 22, 2023 3:00pm Prevent account takeover fraud in seconds using phone intelligence Michael Becker - Identity Praxis, Van Hoeylandt Bram - Proximus, Surash Patel - telesign and Pravesh Arora - telesign As we reflect on the year gone by, something we can all agree on is that cybercrime isn’t showing signs of slowing down. One area of concern is Acco... 5 days ago | 57 mins Rise of the Machines Dr. Zero Trust, Chase Cunningham It seems like the market has finally agreed that we need to manage user identities, and that's a good thing. But what are we doing about "the machine... 5 days ago | 30 mins Cyber Notes Cast - Machine Identity Management Best Practices senhasegura Remote work and the adoption of cloud computing surfaced the concept of identity as a perimeter. In this sense, although it is not new, identity secur... 2 weeks ago | 16 mins How Mature Behavior Analytics Accelerates Detection of Persistent Threats Sanjay Raja, VP Product Marketing and Solutions, Gurucul Many solutions that have some threat detection and response capabilities, such as SIEM and XDR, are claiming to add User and Entity Behavior Analytics... March 23, 2023 6:00pm Load more