Search

1 to 10 of 37
Sort by

Blog Entry
Gaining Deeper Identity Insights to Be Able to Make Better Access Decisions

Just because a user presents an accurate user name, password, IP and geolocation does not mean the user is legitimate. The harsh fact is that today's IAM systems are based on a time-worn — maybe worn out? — static approach to assessing risk. The static attributes traditionally used to identify...

DIANE BENJUYA's profile image

Event
Beating Fraudsters at Their Own Game with Fraud Reduction Intelligence Platforms

Fraud prevention continues to be a major challenge for many organizations today as we turn to digital. Finance, retail, insurance and other industries find themselves confronting increasingly sophisticated cyberattacks that are draining resources and offsetting digital growth. ...

 Wed October 21, 2020 | 11:00 AM - 12:00 PM ET


Blog Entry
The New Frontier of Fraud – Massive Mobile Emulator Fraudulent Operation

Co-authored by Ezra Maybruch. As the use of mobile devices grows exponentially in all industries, fraudsters are looking for innovative ways of exploiting this field. Consequently, IBM Security Trusteer Fraud Analytics has recently discovered a new large-scale mobile emulator-based fraud...

Doron Hillman's profile image

Blog Entry
What’s New with IBM Security Trusteer

As most readers here know, IBM Security Trusteer helps enterprises accelerate digital growth by seamlessly detecting fraud risk (including in IAM systems such as IBM Security Verify), establishing digital identity trust and simplifying access with frictionless continuous authentication across...

Beery Holstein's profile image

Blog Entry
IBM Champions in Action: Gregor Frimodt-Møller

IBM Champions demonstrate both expertise in and extraordinary support and advocacy for IBM technology, communities, and solutions. The IBM Champion program recognizes these innovative thought leaders in the technical community and rewards these contributions by amplifying their voice and...

Jennifer Barraclough's profile image

Blog Entry
Learn How Trusteer Solved a Large-Scale SMS Phishing Attack in Japan

Co-authored by Shir Levin The IBM Security Trusteer team just battled an interesting case of account takeover (ATO) fraud that targeted end-users of a large retail bank application in Japan. This application normally deals with around 200 fraud sessions a month. Last month, that number shot...

Eran Coster's profile image



Blog Entry
Join Your IBM Security Community Peers at IBM User Group Days on May 19-20

Have you heard about IBM User Group Days? This special two-day virtual event is sponsored by the IBM Community and designed to let you engage with fellow Community members and IBM subject matter experts from the comfort and safety of your own home. User Groups Days will take place May 19-20 and...