Posts

Robert Capps, Pymt podcast

Consumers Beware: There’s No Such Thing As A Free App

Robert Capps, Pymt podcastPYMTS | June 1, 2021 – If you’re using a service and not paying for it, then you’re not the customer, you’re the product. Free isn’t really free and there is often a price to be paid for accepting the service – sometimes an incredibly high one. “When installing apps infected with software that makes your computer part of a botnet, the traffic from your machine will look like it’s originating from you, and there could be potential consequences,” says NuData’s

Read More >

ransomware

Advice on Anti-Ransomware Day: Prepare as if it’s any other kind of cyberattack

ransomwareIT World Canada | May 12, 2021 – If you’re well-prepared for any cyberattack you’re prepared for ransomware. “Ransomware is a disaster recovery event,” says Robert Capps, vice-president of innovation at the NuData Security division of Mastercard. “And for a lot of organizations, it’s a fairly mild one. For others, it can be business-impacting. “When you talk to CISOs about any sort of disaster situation it comes down to resiliency and recoverability. Ransomware is just a fancy disruption attack. There

Read More >

Data-Security

The Increasing Importance Of Data Security

Data-SecurityTaxgirl | May 11, 2021 – As society continues to do more online, data security is more important than ever before. That goes for your taxes and the IRS as well. In their annual report, the IRS identified $2.3 billion in tax fraud schemes in 2020. Are you protected from data security issues? Kelly is joined by Robert Capps, the vice president of emerging technologies for NuData Security — a Mastercard company. Kelly and Robert discuss the increasing importance of

Read More >

Biometrics and Privacy

Biometrics and Privacy

Biometrics and PrivacyAccount takeovers are increasingly affecting a growing population of online user accounts due to a confluence of threats, such as weak consumer password practices, frequent mass data breaches, and brute force attacks against web properties. The scope, scale and frequency of these online attacks against user accounts has demonstrated time and again, that companies can no longer rely upon authentication methods based on static elements that can and will be stolen, traded, and sold to the highest bidder in underground

Read More >