• Scott Gregory
    Scott Gregory Aug 28, 2019

    Outflanking fraud and fakers: How biometrics can safeguard online account opening

    Consumers expect online convenience; fraudsters expect an easy target. Here’s how banks can win on both fronts.

    Read More
  • Behavioral analytics for detecting fraud

    Craig Priess Mar 18, 2015

    As bankers grapple with fighting off fraudsters who seek to steal the identities of their customers, they should consider behavioral analytics as a useful weapon in that battle.

    Read More
  • Bolstering defenses against cyber attack

    Aaron Scicluna Feb 11, 2015

    Responding to data breaches requires that financial institutions implement a proactive vulnerability management plan and basic security protocols such as network segmentation.

    Read More
  • Responding proactively to cyber threats

    Ajay Patel Jan 7, 2015

    To ward off cyber fraud, banks need to deploy proactive detection systems, give the chief information security officer enterprise-wide authority and improve customer education.

    Read More
  • Credentialing customers for security

    Sean Trundy Dec 17, 2014

    Credentialing customers via biometrics offers banks a way to improve security for customers while increasing their own market share.

    Read More
  • Protecting Vital Customer Information

    Mark Hickman
    Mark Hickman Nov 24, 2014

    Protecting a customer’s vital financial information requires that financial institutions encrypt and track the flow of that data.

    Read More
  • Regional Banks May Face Mortgage Fraud Scrutiny

    • Mark A. Romance
    • Nathaniel M. Edenfield
    Nov 17, 2014

    As the nation’s largest banks settle mortgage fraud-related cases, evidence mounts that federal prosecutors will turn their focus next to regional banks.

    Read More
  • Preventing Data Theft at the Branch Level

    Meredith Deen1
    Meredith Deen Sep 2, 2014

    While cyberattacks get the most attention, much data theft at banks occurs at the branch level and can be mitigated by applying appropriate digital security measures.

    Read More