ThreatMetrix Cybercrime Report: An interview

Introduction

In a recent Infosec Cyber Work podcast, we welcomed Rebekah Moody, market planning director at ThreatMetrix, a LexisNexis Risk Solutions company. Rebekah also co-authored the H2 2018 Cybercrime Report on behalf of ThreatMetrix. In this broadcast, Rebekah gave us an insight into how the report is created and what it tells us about the current state of cybercrime. 

Rebekah works with sales, analysts and customers to help develop the report. She has over 12 years of industry experience which she can draw on to help develop insights.

Rebekah first became interested in computing and cybercrime from a background in product strategy and planning. She told us how she “fell” into the security business from working in fraud and has now worked with LexisNexis and ThreatMetrix for over four years.

Creating the H2 2018 Cybercrime Report

The ThreatMetrix Cybercrime Report has been going since 2015 and Rebekah has been involved for most of that time. The Cybercrime Report is biannual.

Originally, the data collected to create the report was in the millions of transactions, but the numbers have grown to many billions, adding increasing weight to the findings. An interesting fact that has crystallized from this year’s report is that in the 2015 version, 20% of network traffic came from mobile traffic; the latest report is based on 61% of traffic originating from mobile networks.

This is interesting as it also shows changes in customer trends and consumer behavior, both of which influence global cybercrime trends.

The H2 2018 Cybercrime Report is compiled from analysis of transactions across the ThreatMetrix network, which currently stands at around 35 billion transactions a year. These transactions reflect a global customer base across most industries and represents transactions across the entire customer journey. Touchpoints include new accounts registration, login attempts and payment transactions. (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Susan Morrow. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/MCVqogGjIYQ/