Data Breach

Customer intelligence elevates data confidence...

Posted on Dec 16 2015 by
Leveraging customer intelligence in the age of mass data compromise...

Read more ››

Surveillance, staging and the fraud lifecycle...

Posted on Aug 01 2015 by
Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe account activity to understand the ebbs and flows of normal...

Read more ››

After a Breach… Now What?...

Posted on Feb 11 2015 by
The news of the latest breach last week reported that tens of millions of customer and employee records were stolen by a sophisticated hacker incursion. The data lost is reported to include names, birth dates, Social Security...

Read more ››

6 Key Predictions on How Data Breach Concerns Will Evolve in...

Posted on Apr 30 2014 by
By: Maria Moynihan In less than a year, my information has been compromised twice by a data breach.  The companies involved varied significantly by way of size and type, yet both reacted expeditiously to inform me of the...

Read more ››

What’s the hubbub, Bub?...

Posted on Sep 16 2010 by
Anyone keeping tabs on the legal scene would think data breaches are something new, given all of the legislation hitting the floor of Congress, when in reality they have been happening since businesses began saving data. The...

Read more ››

Children’s Social Security numbers used in new fraud t...

Posted on Sep 10 2010 by
Quite a scary new (although in some ways old) form of identity theft in the headlines recently. Here’s a link to the article, which talks about how children’s dormant Social Security numbers are being found and sold by...

Read more ››

Webinar Registration

Get every new post delivered to your Inbox

Enter email address to subscribe:

Latest Tweets

Archives