Technology

 

Creating a Fraud Risk Scoring Model Leveraging Data Pipelines, ML With Splunk

Organizations that undertake proactive data analysis techniques, experience frauds that are up to 54% less costly and 50% shorter than organizations that do not monitor and analyze... More

Frankenstein Fraud, Deepfakes, Replay Attacks: How to Identify Identity Fraud Threats (Raconteur)

Online fraud has accelerated during the coronavirus pandemic, meaning organisations must be more vigilant in the face of the seemingly ever-increasing threat and its impact on busi... More

Listen Carefully: The Growing Threat of Audio Deepfake Scams (Tech Monitor)

AI software capable of cloning voices is proving a useful weapon for fraudsters.... More

Mobile Commerce Could Lead to Biometrics Boom by 2025 (Tech HQ)

Contactless transactions utilizing an aspect of biometric authentication is predicted to increase by over 520% in the time between 2020 and 2025. Just last year alone, biometrics a... More

Stacking CDNs for Improved Performance, Security (Akamai Blog)

Using an eCDN as an origin is very similar to using a traditional origin, except we will be fetching content from a CDN server rather than a hosted instance of your application.... More

How to Secure the Cloud as a Universal Production Resource? (2030 Vision Blog)

The complexity of delivering security to cloud users far beyond the perimeters of any facility needs a new approach to security.... More

Network Security: Predictions for 2021 (Palo Alto Networks Blog)

The simplest way to summarize 2020 is with one word: unpredictable.... More

Payment Security Issues Remains a Big Worry for Online Retailers, Consumers (Twice)

Report finds consumers are looking for safer and more secure ways to pay.... More

Shadow IT: Addressing the Risks in Remote Work Environments (Security Intelligence)

Shadow IT can cause big problems for cybersecurity. The trouble is in the name: these connections exist in the shadows outside of IT (information technology) and security personnel... More

Spotify Just Invented AI Technology That Will Police Songwriter Plagiarism (MBW)

Songwriters of global hits getting sued for alleged plagiarism has become a recurrent story these past few years – and a recurrent source of misery for writers and their represen... More

Splunk to Acquire Cloud Network Observability Provider Flowmill

Splunk signed a definitive agreement to acquire Flowmill, a Palo-Alto based cloud network observability company with expertise in network performance monitoring. With this acquisit... More

Meet the Hackers Who Earn Millions for Saving the Web, One Bug at a Time (ZDNet)

These hackers are finding security bugs – and getting paid for it. That's changing the dynamics of cybersecurity.... More

NAGRA Content Protection Solutions Selected by Canal+ Group for Satellite Operator M7

NAGRA announced today that Canal+ Group, the leading French audiovisual media group, has selected NAGRA content protection technologies to secure pay-TV services for M7, the Luxemb... More

The Problem With How Most Banks Use IP Address Checks to Fight Fraud (PYMNTS)

The growing cost of online fraud – and finding ways to detect it – has long been a costly concern of financial institutions. But GeoGuard CEO David Briggs said in a recent conv... More

Convergent Launches Cloud Configuration Vulnerability Scanning Service

Risk assessment and compliance services firm Convergent Risks has launched a new, managed cloud configuration vulnerability scanning service, aimed at making it easier for companie... More

Akamai, Snyk Partnership Creates Powerful Combination for In-Browser Script Protection (Security Boulevard)

A web experience begins with the sum of the code you created. But it also includes all the code the user is put in contact with when loading your website... More

Death by a Thousand Cuts: Nuisance DDoS Attacks in the Games Industry (Akamai Blog)

The video games industry is a big target, but the attacks are overall well distributed across industries.... More

Dark Side of AI: How to Make Artificial Intelligence Trustworthy (IW)

It's in every organization's best interest to implement security measures that counter threats in order to protect artificial intelligence investments.... More

How Hackers are Weaponizing AI (TechHQ)

In an age where everything is becoming connected and data is regarded as a business’s most valuable commodity, cybersecurity continues to diversify in a hyper-competitive marketp... More

Facebook Gaming Will Allow Partnered Streamers to Play Copyrighted Music (The Verge)

Facebook Gaming is set to allow its partnered streamers to play copyrighted, popular music in the background of their live streams — which means they’ve seemingly solved the co... More

Sign up for our newsletters
* indicates required
MESA Newsletters