What are the biggest privacy and security concerns in healthcare when it comes to the use of big data and data analytics tools? Attorneys Elizabeth Mann and Brad Peterson explain what organizations need to know before they dig in.
Companies offering cybersecurity products are using the terms "artificial intelligence" and "machine learning" in many different ways. But the real meanings of the terms are far more nuanced than marketing hyperbole would lead us to believe, says Grant Wernick of Insight Engines.
An unusual breach notification issued by health insurer Humana shows how some organizations are identifying anomalous behaviors of voice technology users to detect potential fraud.
For over a decade, a crucial part of fraud detection has been assigning an identity to every laptop, tablet, and mobile device that accesses a website or app. Such a fingerprint is a representation of hundreds of different device-specific values taken from an end user's device.
Today's device fingerprinting...
When it comes to fraud, enterprise data has a story to tell, and it's up to security and fraud leaders to know how to interpret that story.
Download this whitepaper to learn more about:
How to recognize fraud in your environment;
How to quickly spot anomalous behavior;
Best practices for using machine data and...
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
As account opening continues to transition from physical to digital channels, financial institutions and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise thanks to some of the same digital channel benefits enjoyed by consumers:...
Technology, regulations and customer expectations all have evolved. What does this mean for how organizations secure identities? Baber Amin of the Office of the CTO of Ping Identity offers strategic insight.
How can we future-proof against fraud? Keith Carlson, general manager of payments and fraud prevention at Amazon Web Services, discusses the people, skills and technologies necessary to prevent fraud - and prepare for the unexpected.
Armed with stolen personal data, cybercriminals can easily bypass conventional identity authentication methods. So how can organizations strengthen authentication without harming customer experience? Shaked Vax of IBM Security shares insights.
According to a recent report, The Identity Fraud Study, released by Javelin Strategy & Research, it showed in 2015, there were more than 1.5 million new account fraud victims that accounted for losses of $2.8 billion. This number increased by 40% in 2016, and there is no reason to believe that this trend is stopping...
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
Cybercrime is an entire economy. And like in any market, current trends fade and new ones take their place.
Notable attack trends such as fileless malware employing PowerShell scripts, watering hole attacks that employ destructive payloads, and island hopping via cloud are forcing enterprises to adopt a new...
Fraud losses have reached staggering amounts - an estimated $20 billion last year. Moreover, this very lucrative crime is here to stay. How can businesses bounce back after being victimized? Sadly, many cannot. This makes prevention, identification and isolation imperative to business operations. This session focuses...
Fraudsters are increasingly enhancing their schemes to make detection by traditional fraud models more difficult, and these shifting fraud patterns ultimately result in institutions continuously having to allocate additional resources. Furthermore, Fraud operations and investigations are faced with a constant flux in...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.