Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Publications

50+ risk signals of fraud

Fraud today comes in many forms. In our work helping hundreds of companies fight fraud, we've found that the most effective ones take a holistic approach: they analyze multiple user signals, they look at population-level trends, and they actively segment their users. If you're interested in supercharging your fraud-fighting strategy, this asset is for you. In it, we list our top 50 signals for identifying fraud. Add them to your arsenal, fill in gaps, or just learn how fraudsters are working.

The identity professional's guide to getting (and staying) compliant with the regulations that affect your business

Regulations are everywhere. And they're multiplying. There are regulations around industries, geographies, types of data, user populations, and more. What's a well-meaning identity professional to do? Worry no more. This guide is here to walk you through the terrifying landscape of regulations and compliance. It gives you key background information, talks about what teams might be inclined to do-but absolutely shouldn't, and lays out a ton of actionable strategies for building a long-term compliance strategy.