Cybersecurity

Computer security, cybersecurity or information technology security is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Source: en.wikipedia.org

Deep Dive: How AI- and ML-Powered Analysis Can Improve Fraud Detection and Investigation

Deep Dive: How AI- and ML-Powered Analysis Can Improve Fraud Detection and Investigation
Deep Dive: How AI- and ML-Powered Analysis Can Improve Fraud Detection and Investigation
September 17, 2021  |  Fraud Prevention

Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required....

READ MORE >
Moody’s, BitSight Team On Cybersecurity Risk Platform
Moody’s, BitSight Team On Cybersecurity Risk Platform
September 13, 2021  |  Risk Management

Moody’s Corporation and BitSight announced a collaborative effort aimed at helping the companies’ customers identify and quantify cybersecurity risk and potential for financial exposure, according...

READ MORE >
MonetaGo Combats Financing Fraud With New Global Offering
MonetaGo Combats Financing Fraud With New Global Offering
September 13, 2021  |  B2B Payments

Singapore-based financial technology solutions provider MonetaGo on Monday (Sept. 13) announced a new platform that will fight global financing fraud in trade finance. Get the...

READ MORE >
Mission Lane on Reducing Customer Friction Using Behavioral Analytics
Mission Lane on Reducing Customer Friction Using Behavioral Analytics
September 13, 2021  |  Authentication

Firms are all too often forced to sacrifice the customer experience in the name of boosting fraud prevention, but who says you can’t have it...

READ MORE >
Deep Dive: How Remote Work Is Fueling Multifactor Authentication Adoption
Deep Dive: How Remote Work Is Fueling Multifactor Authentication Adoption
September 13, 2021  |  Authentication

Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required....

READ MORE >
Automation Can Do For SCA Compliance What Human Hands Cannot
Automation Can Do For SCA Compliance What Human Hands Cannot
September 13, 2021  |  Authentication

Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required....

READ MORE >
Globalization Partners on How Technology Platforms Can Boost Security, Ease Onboarding for a Remote Workforce
Globalization Partners on How Technology Platforms Can Boost Security, Ease Onboarding for a Remote Workforce
September 10, 2021  |  Authentication

Supporting a remote or hybrid workforce is creating new security headaches for businesses around the globe. In The Digital Identity Tracker, Gerard Keating, chief technology...

READ MORE >
Report: Behavioral Analytics Curb Online Friction Without Compromising Security
Report: Behavioral Analytics Curb Online Friction Without Compromising Security
September 10, 2021  |  Authentication

Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required....

READ MORE >