Blog

Blog

Can you tell who the user really is?

Fingerprints“How did the data get out?”The question nobody wants to hear from their boss. It’s a nightmare for corporate management, press officers and security teams. Blame flies around the office while brands and careers are damaged in equal measure. Everybody wants to know how this happened and how to prevent this from ever happening again. Before we get onto that, take a look at the causes behind some high profile security breaches and data loss events:Stolen usernames and passwords (e.g.,

Read More >

How criminals can instantly buy your identity

credit cardsIn the middle of teaching his Journalism class at NYU, Adam Penenberg’s laptop stops but it’s not frozen. A grey screen appears and directs him to dial a number to unlock his computer. Bemused, as the lecture grinds to a halt, he reaches for his phone. It won’t accept his PIN code. He’s been hacked. You might not be aware that hijacking somebody’s life - full-scale identity theft – doesn’t require any hacking expertise. Just criminal intent and some spare

Read More >

Gartner Identity and Access Management Summit 2013 (IAM)

gartner-logoFrom the 18th – 20th of November, Los Angeles will host the Gartner Identity and Access Management Summit 2013 (IAM) where the most innovative vendors and progressive speakers will cover all things identity. Find us at Booth 114. The summit is host to exclusive presentations and seminars on key areas: IAM, security, mobility and cloud IAM best practices for deployment/operations Leveraging external identities Data security/IAM convergence Justifying IAM value for the business For more information on NuData Security’s presence and continuous

Read More >

When is Fraud Friendly? E-commerce Fraud 101

locked padlockIn the e-commerce world, there are three common types of fraud: First Party Fraud Third Party Fraud Seller Fraud First Party Fraud This is when the customer is legitimately trying to scam you. In e-commerce this might be: Claiming a product wasn’t delivered Reading a book and requesting a refund Claiming they didn’t make the charge on the credit card What makes this difficult to combat is that it may be seasonal; recession time sees an increase in first party

Read More >

Increase E-Commerce Profits using Risk Based Authentication

Security Token Risk Based AuthenticationMost websites use the combination of usernames and passwords. Both are items that a user knows.  Asking “what street did I grow up on”, is just asking more things that a user knows, firms that do this are just implementing more KBA’s. Economics of Authentication To use some basic economics, the addition of the password as opposed to not requiring validation has a huge marginal benefit to the company. Implementing a second, and third and forth has an ever decreasing

Read More >