Portfolio Marketing Manager
Does your Business Structure Stack up to Organized Cybercrime?
There was a time when the biggest perceived threat to corporations online was the lone, basement-dweller whose mission to unleash makeshift mayhem left unsuspecting networks vulnerable to attack. Names like Albert Gonzalez, who notoriously extracted millions of credit and debit card numbers from TJX Companies, might come to mind. Cybercrime, however, has evolved to unprecedented levels of complexity that looked more like business structures than singular bad actors. Today, crime rings often include organizational charts, international reach, C-level executives and even human resources departments. Crimeware-as-a-service (Caas) tools like these make recruiting easier than ever for ring leaders. In fact, some even... Read More
Manager, Security Operations Center
Fraud Prevention Part 2 of 2: Developing a High-Impact Fraud Protection Program
In the second of two blog postings on fraud prevention, Jack reviews ways to develop a high-impact fraud protection program. A high-impact fraud program starts with an understanding of the evolving cybercrime landscape. We covered this in our earlier blog posting. Sophisticated techniques to evade detection Today’s cybercriminals use a host obfuscation techniques to evade detection which  makes it extremely difficult to identify the many elements needed to investigate  cyber-attacks. Techniques include geographic IP address blocking and browser language detection. A cybercriminal will often create phishing attacks targeting a certain region, and combine this with methods of blocking all attempts to... Read More
Portfolio Marketing Manager
Fraud Prevention Part 1 of 2: Trends in Social Engineering
In Part 1 of a 2-part blog on fraud prevention, Stefanie reviews  current trends in social engineering. Fraud today is often based on Social Engineering, or the psychological manipulating of people into performing actions or divulging confidential information. It’s a type of confidence trick for the purpose of information gathering, fraud, or system access. It differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. There are three main categories of fraud: [1] Phishing is the ‘grandfather’ of all online scams. It has been around for over 15 years. Fraudsters are... Read More


Follow Us

Get all the latest updates

Get all the latest updates

Featured Author

Alison Simpson
With more than 13 years’ experience in the domain industry, Alison has managed all aspects of Corporate Domain Managem... More