top of page


From Trusted to Threat: The Hidden Risks of Verified Accounts
Why Continuous Monitoring Is Essential for Account Protection Business leaders and fraud managers invest significant resources in...
Don Bush
Oct 13 min read


Sleeper Accounts Are Waking Up, Right on Cue for iPhone 17 Pre-Orders & Holidays
Apple just opened iPhone 17 pre-orders (stores launch September 19), and history has shown that fraudsters treat new-phone hype and...
Don Bush
Sep 173 min read


Mind the Gap in Your Verification Analysis
Bridging the Divide Between Breach Data and Actionable Intelligence It has been a year since the massive AT&T data breach shook the...
Don Bush
Aug 272 min read


The Rising Threat of Business Email Compromise
Cybercrime is evolving faster than ever, and Business Email Compromise (BEC) stands out as one of the most insidious threats. Unlike...
Don Bush
Aug 211 min read


Evolving Landscape of Cyber Threats Necessitates Advanced Risk Assessment for Cyber Insurers
Cyber insurance is a critical tool for businesses to mitigate financial losses from cyberattacks. However, insurers' traditional approach...
Don Bush
Jul 311 min read


Pig Butchering Scams: A CISO’s Guide to Mitigating a Sophisticated Cyber Threat
According to the Global Anti-Scam Alliance ( GASA ) and Chainalysis Reports , "pig butchering" scams, which involve luring victims into...
Karen Simmons
Jul 94 min read


The Hidden Vulnerability: How Compromised Credentials Fuel Ransomware and Beyond
In today's interconnected digital landscape, the security of a company's sensitive data is only as strong as its weakest link. While...
Don Bush
Jun 114 min read


From Boasting to Breach: The Escalating Risk of Your Online Life
Imagine Johnny, an AI expert, famous for his globetrotting talks, boasting about racking up over a million Delta miles. Unbeknownst to...
Grace Howard
May 283 min read


From Inbox to Outbreak: The BEC and FTF Epidemic
#emailfraud, #bec, #emailreputation
Grace Howard
May 143 min read


Verizon Report: Proactive Credential Screening - Your First Line of Cyber Defense
#credentialscreening, #ATOprevention, #VerizonDBIR, #cybersecurity
Don Bush
May 73 min read


Anyone Can Get Phished
#phishing #itcanhappentoanyone #fraudprevention
Jen Baldwin
Apr 22 min read


The Three Factors of Authentication: A Fraudster's Playground
#onlinefraud #fraudtactics #faceid #touchid
Jen Baldwin
Mar 53 min read


Bruce Lee Got it Right, “Be Like Water” or “Don't Block IP Addresses”
#identityintelligence #bestpractice #fraudprevention #brucelee, #belikewater
Jen Baldwin
Feb 262 min read


Please Don't Block My Grandma Because My Fridge is Hacked! (Or, Why IP Blocking is Dumb)
Story time! Gather 'round and gain some wisdom.
#identityintelligence #bestpractice #fraudprevention
Jen Baldwin
Feb 52 min read
bottom of page
