Here’s how NuData helped one bank improve user experience without compromising security

Does effective security have to come at the cost of user experience? Here’s how behavioral biometrics improves both. The post Here’s how NuData helped one bank improve user experience without compromising security ...
NuData Sophisticated Attacks Graph

3 key takeaways from our Consumer and Risk Report

How can businesses improve cybersecurity efforts in 2022? By understanding the tactics fraudsters use most. The post 3 key takeaways from our Consumer and Risk Report appeared first on NuData Security ...

How much do fraudsters invest to take down your company?

Over our past few blogs, we’ve explored how device intelligence and behavioral analytics stop fraud in its tracks. But what type of fraud are we talking about, exactly? The post How much ...
Enigma 2019

USENIX Enigma 2019, Ajit Gaddam’s ‘Usage Of Behavioral Biometric Technologies To Defend Against Bots’

Thanks to USENIX for publishing the USENIX Enigma 2019 outstanding conference videos on their YouTube Channel Permalink ...
Tracking Illegal Terrorist Funding Campaigns Via Cryptographic Currencies Tools

Tracking Illegal Terrorist Funding Campaigns Via Cryptographic Currencies Tools

With superb research efforts, and the equally fascinating tutorials available for researchers targeting the problematic of illegality in terrorist funding, Brenna Smith divulges what it takes to discover, and subsequently track ill-gotten ...

Application Security Check Up