top of page

Jen Baldwin
Feb 262 min read
Bruce Lee Got it Right, “Be Like Water” or “Don't Block IP Addresses”
#identityintelligence #bestpractice #fraudprevention #brucelee, #belikewater
6
0


Karen Simmons
Feb 193 min read
Act fast to stay ahead of fraudsters
Catch them before they damage your customers & business #fraudprevention #cybersecurity #credentialstuffing #datasecurity #databreach
6
0


Don Bush
Feb 123 min read
12
0


Rob Long
Jan 153 min read
Canary in the Coal Mine: Detecting Account Takeover Before Your Digital Canary Dies
Use active web monitoring to protect your business from credential stuffing & account takeovers. #Cybersecurity #DataBreach #AccountTakeover
17
0


Justin McDonald
Nov 20, 20243 min read
Is your Identity Solution Balanced? Prevention or Remediation
Balancing prevention & remediation is key in protecting against ATO. Choose the right mix to minimize risk & customer friction.
17
0


David Montague
Nov 7, 20244 min read
YOU HAVE BEEN BREACHED: Consumer Credential Stuffing
Credential stuffing costs millions. 23andMe's $30M settlement is a wake-up call. Protect your customers and your business with myNetWatchman
9
0


David Montague
Oct 31, 20244 min read
Beyond the Inbox: The Far-Reaching Impact of Email Compromise
Email is a prime hacker target. Compromised emails can mean data theft, financial loss, & brand damage. Learn how to protect your business
12
0

Justin McDonald
Oct 30, 20242 min read
New White Paper from The Fraud Practice and myNetWatchman Discusses Balancing Protection Against ATO with Preserving the User Experience
We provide an alternative perspective on the myth that 2FA makes user credentials secure so you don’t need to detect compromised credentials
13
0

Karen Simmons
Oct 23, 20243 min read
Anatomy of Email Compromise
Protect your castle! Compromised emails put data & accounts at risk. Businesses using email for 2FA need a new approach. #cybersecurity
32
0

Justin McDonald
Oct 3, 20241 min read
Register for our Upcoming Webinar: User Credentials are Not Secured with 2FA Alone
Join us for our upcoming webinar October 23 at 1 PM ET/ 10 AM PT: User Credentials are Not Secured with 2FA Alone
34
0


Karen Simmons
Sep 25, 20243 min read
User Password Behavior can be Exploited by Criminals
Criminals exploit predictable password patterns & variations to access accounts. Screening services can detect compromised credentials
12
0


Karen Simmons
Sep 4, 20244 min read
Anatomy of an FI Credential Stuffing Attack
Financial Institutions are not immune to credential stuffing. Here’s an example of an attack on an FI, its risk and success.
39
0
bottom of page