Blog

Blog

Is your device as unique as you are? Spoiler: Almost.

With 97% of attacks coming from an anomalous device or network, devices have the power to uncover most of today’s threats – if used right.If you missed our device intelligence webinar (Are Devices as Unique as You Are?) read on for the key points or watch the replay here.What are the common limitations of device intel?If there was an absolute device identifier that lasted for as long as a device, we wouldn’t be talking about this today. Most device intelligence

Read More >

March event madness!

RSA - NuData boothMarch has moved at a breathtaking speed. With the beginning of spring, NuData ends its busiest month that included three back-to-back conferences, keeping us on our toes but also up to date on the latest in cybersecurity. We went from the beautiful views and unique architecture of San Francisco to the glitz and glam of Las Vegas. Here are a few things we learned on the way. First stop: RSA RSA is one of the largest cybersecurity conferences in the world. This year,

Read More >

What The Food at MRC Vegas 2019 Taught us About Fraud

MRC Vegas 2019 foodWith over 1,600 attendees, MRC 2019 was a hot pot of merchants, fraud problems, and innovative ideas – with a side of mouth-watering desserts.There is one thing we can all agree on after attending the MRC 2019 conference in Vegas: The time for canned solutions is long gone. Like the diverse and elaborate cuisine we enjoyed during the MRC buffet, fraud experts need to combine different security tools and flavors to meet the security requirements of constantly-evolving merchant challenges and

Read More >

From Philosophy Theorist to Data Science Manager; Introducing John Hearty

John hearty making an effort to pose"Studying alone wasn’t going to cut it; the employers you really want to work for look for people who’ve gone out and do something alongside their studies".I was one of those kids that has too many questions, so at my high school it was generally agreed that Philosophy was a good fit for me. Employability was not a factor in my decision making then!I studied Philosophy at Nottingham. Undergraduate Philosophy study was pretty much 3 years of learning the proper

Read More >

Why should you need a security tool on top of EMV 3DS?

woman buying online with smart interface emv 3ds and behavioral biometricsJulie Conroy, research director at Aite Group said it best “A technology that authenticates the end user in parallel with authorization, can save organizational costs and increase transaction approval rates for merchants.”This article summarizes our conversations during our EMV 3DS webinar with NuData and Mastercard experts.Full disclosure: yes, we offer a product that combines EMV 3DS with behavioral biometrics technology, so you can expect that we will recommend using a tool in addition to EMV 3DS, but we wouldn’t do

Read More >