Adaptive Authentication

What Peanut Butter Cups Can Teach Us About Fraud Prevention

Reese’s® Peanut Butter Cups are a “so-good-it-has-to-be-bad-for-you” treat adored by candy lovers everywhere. The combination of peanut butter and chocolate is such a classic it’s hard to remember there was a time no one thought about putting these two together. In fact, Reese’s built an entire advertising campaign around the odd couple concept. The original…

Your Step-Up Authentication Compass… NIST & SMS – Finding North

An estuary is the area where a river meets the sea (or ocean), where fresh water from the river meets salt water from the sea. The fresh draft of the NIST Digital Authentication Guidance (NIST SP800-63B) has been let loose into the salt waters of the public and certainly provoked some conversation of late around…

How to Manage Identities in the Modern IT Environment

In the world of modern IT, most spending is outside the IT department’s control. Employees demand to be allowed to use the latest and greatest mobile devices and gadgets, but decision-makers are often too busy or unwilling to allocate funds. This has left organizations grappling with bring-your-own-device challenges. Business units that want to use best-of-breed…

Renewed Impetus for Identity Management

Security incidents are providing renewed impetus for the identity management technology market. The number of breaches in 2014 hit an all-time high, with 27.5 percent more than 2013 in the U.S. alone, according to the Identity Theft Resource Center (ITRC). Since 2005, more than 5,000 breaches have been reported with 675 million records exposed. In…

How a Selfie or Finger Swipe Can Help Prevent Mobile Fraud

RSA is delighted to announce the availability of RSA Adaptive Authentication Mobile SDK 3.0 and with it our agreement with EyeVerify, the creator of Eyeprint ID™. RSA’s Adaptive Authentication Mobile SDK allows organizations to embed risk-based authentication capabilities directly into their mobile app. Mobile SDK 3.0 integrates in app biometric step up authentication for high risk login…

Making Permission (and Access) Easier Than Users Begging for Forgiveness

Organizations frustrate authorized users when it comes to controlling and allowing access to enterprise resources and applications, wherever they may reside. This user frustration has slowed business productivity, created dangerous security risks and vulnerabilities, and allowed incredibly costly hacks, threats, and intrusions. Today, while we have powerful mobile devices able to remotely access data-filled applications…

“I’m more than just my job!”

In this hectic, modern world, too often many people feel reduced to the sum of their professional responsibilities.  In a small way, this feeling is driven by our current IT methods to determine access to IT systems and applications. With ‘Role-based’ access control – you are literally no more than just your job! Essentially, your…

Reducing the Risk of Fraud in the 3D Secure Ecosystem – The Issuer Perspective

3D Secure is a boon to online retailers who benefit from the shift in chargeback liability to card issuers. Participation in 3D Secure is almost a no-brainer from the merchant perspective in that sense. What about card issuers though? According to the Nilson report, issuers absorb over 66% of the more than $5 billion a…

Emerging Threats and Account Takeover Fraud Needs an Innovative Defense Approach

By Amy Blackshaw, Senior Product Marketing Manager, RSA Identity Protection & Verification One of the most difficult challenges for financial institutions today is preventing account takeover fraud in the face of advanced Trojans. In fact, the total number of account takeover attempts reported by financial institutions has more than tripled since 2009, according to survey…

Protecting Banking Users from Online Account Takeover – Podcast # 243

Amy Blackshaw, Sr. Product Marketing Manager for RSA’s Identity Protection and Verification business talks about the burgeoning issue of Account Takeover fraud of online bank accounts through malware and sophisticated attacks. Amy also discusses new features being introduced in the newest version of the RSA Adaptive Authentication solution to help banks and their customers protect…