top of page


Pig Butchering Scams: A CISO’s Guide to Mitigating a Sophisticated Cyber Threat
According to the Global Anti-Scam Alliance ( GASA ) and Chainalysis Reports , "pig butchering" scams, which involve luring victims into...
Karen Simmons
4 days ago4 min read


The Hidden Vulnerability: How Compromised Credentials Fuel Ransomware and Beyond
In today's interconnected digital landscape, the security of a company's sensitive data is only as strong as its weakest link. While...
Don Bush
Jun 114 min read


From Boasting to Breach: The Escalating Risk of Your Online Life
Imagine Johnny, an AI expert, famous for his globetrotting talks, boasting about racking up over a million Delta miles. Unbeknownst to...
Grace Howard
May 283 min read


From Inbox to Outbreak: The BEC and FTF Epidemic
#emailfraud, #bec, #emailreputation
Grace Howard
May 143 min read


Verizon Report: Proactive Credential Screening - Your First Line of Cyber Defense
#credentialscreening, #ATOprevention, #VerizonDBIR, #cybersecurity
Don Bush
May 73 min read


Anyone Can Get Phished
#phishing #itcanhappentoanyone #fraudprevention
Jen Baldwin
Apr 22 min read


The Three Factors of Authentication: A Fraudster's Playground
#onlinefraud #fraudtactics #faceid #touchid
Jen Baldwin
Mar 53 min read


Bruce Lee Got it Right, “Be Like Water” or “Don't Block IP Addresses”
#identityintelligence #bestpractice #fraudprevention #brucelee, #belikewater
Jen Baldwin
Feb 262 min read


Please Don't Block My Grandma Because My Fridge is Hacked! (Or, Why IP Blocking is Dumb)
Story time! Gather 'round and gain some wisdom.
#identityintelligence #bestpractice #fraudprevention
Jen Baldwin
Feb 52 min read
bottom of page