top of page


The Digital Identity Paradox: Why Email Verification is the New Security Frontier
In the modern digital economy, the email address has transcended its original purpose as a communication tool. It has become the near-universal unique identifier—the primary digital ID for billions of users. From financial services to SaaS products, the email address is the default gatekeeper for account creation, password resets, and high-value transactions. However, this reliance has created a dangerous security paradox: while email is treated as a permanent, trusted anchor
Don Bush
Feb 103 min read


Holiday Fraud Is Just the Beginning: How Criminals Use Peak Season to Build Sleeper Accounts for Year-Round Abuse
Yes, criminal activity spikes during peak shopping season. But the most damaging fraud often doesn’t happen in November or December. It happens months later, after the holidays have passed and attention has shifted, using accounts that were created, compromised, or harvested during peak volume. Fraudsters don’t treat the holidays as a sprint, they treat them as account setup season. Fraudsters use the holidays to set up sleeper accounts and synthetic identities, and to harves
Don Bush
Jan 135 min read


From Trusted to Threat: The Hidden Risks of Verified Accounts
Why Continuous Monitoring Is Essential for Account Protection Business leaders and fraud managers invest significant resources in...
Don Bush
Oct 1, 20253 min read


Sleeper Accounts Are Waking Up, Right on Cue for iPhone 17 Pre-Orders & Holidays
Apple just opened iPhone 17 pre-orders (stores launch September 19), and history has shown that fraudsters treat new-phone hype and...
Don Bush
Sep 17, 20253 min read


The Real Economics of Credential Stuffing: Low Success, High Impact
(Excerpts from the recently published Special Report, “ The Economics of Credential Stuffing Attacks and Account Takeover Fraud ” by...
Don Bush
Sep 10, 20252 min read


Is Your Business a Target for Credential Stuffing?
Credential stuffing is a serious cyberattack because it’s cheap, easy to scale, and takes advantage of the common problem of people...
Don Bush
Sep 5, 20251 min read


Webinar Recording – Using Live Data to Stop ATO
According to the 2025 Verizon Data Breach Incident Report, credential abuse (i.e., credential stuffing, account takeover attacks, etc.)...
Don Bush
Aug 13, 20253 min read


Big Mac, Fries, and 64 million Records To Go Please
Seriously, McDonald's? A Wake-Up Call for Enterprise Security Leaders. To all CISOs, cybersecurity managers, and fraud prevention experts...
Don Bush
Jul 16, 20254 min read


The Achilles' Heel of Online Security: Why Passwords Leave Companies Vulnerable
In our digital-first world, passwords, combined with an email address or User ID, are the primary gatekeepers to vast amounts of...
Don Bush
Jun 25, 20253 min read


The Hidden Vulnerability: How Compromised Credentials Fuel Ransomware and Beyond
In today's interconnected digital landscape, the security of a company's sensitive data is only as strong as its weakest link. While...
Don Bush
Jun 11, 20254 min read


From Boasting to Breach: The Escalating Risk of Your Online Life
Imagine Johnny, an AI expert, famous for his globetrotting talks, boasting about racking up over a million Delta miles. Unbeknownst to...
Grace Howard
May 28, 20253 min read


Verizon Report: Proactive Credential Screening - Your First Line of Cyber Defense
#credentialscreening, #ATOprevention, #VerizonDBIR, #cybersecurity
Don Bush
May 7, 20253 min read


Exclusive Webinar - From Target to Fortress: Safeguarding the Travel Industry Against Account Takeover
Register now for this April 22, 2025 webinar presented by myNetWatchman and Loyalty Security Alliance
Don Bush
Apr 9, 20251 min read


Anyone Can Get Phished
#phishing #itcanhappentoanyone #fraudprevention
Jen Baldwin
Apr 2, 20252 min read


Stolen Miles, Shattered Dreams: How Account Takeover Wreaks Havoc
#travel, #loyaltyprogram, #airlines, #hotels, #carrental, #ATO
Don Bush
Mar 12, 20253 min read


Bruce Lee Got it Right, “Be Like Water” or “Don't Block IP Addresses”
#identityintelligence #bestpractice #fraudprevention #brucelee, #belikewater
Jen Baldwin
Feb 26, 20252 min read


Act fast to stay ahead of fraudsters
Catch them before they damage your customers & business #fraudprevention #cybersecurity #credentialstuffing #datasecurity #databreach
Karen Simmons
Feb 19, 20253 min read


Don Bush
Feb 12, 20253 min read


Canary in the Coal Mine: Detecting Account Takeover Before Your Digital Canary Dies
Use active web monitoring to protect your business from credential stuffing & account takeovers. #Cybersecurity #DataBreach #AccountTakeover
Rob Long
Jan 15, 20253 min read


Is your Identity Solution Balanced? Prevention or Remediation
Balancing prevention & remediation is key in protecting against ATO. Choose the right mix to minimize risk & customer friction.
Justin McDonald
Nov 20, 20243 min read
bottom of page
