How COVID-19 is Testing Telcos’ Mettle

| | Security Trends
By Chris Burke, Sr. Director of Telco Sales at Shape Security We live in testing times. For telecoms operators, the COVID-19 pandemic is throwing up challenge after challenge. These range from a major mismatch between network configuration and the new traffic patterns, to physical attacks on 5G infrastructure and elaborate ... Read More
Join Us For Shape’s App Security & Fraud Summit

Join Us For Shape’s App Security & Fraud Summit

| | Security Trends
One final reminder! Shape’s App Security & Fraud Summit — Virtual Event — is tomorrow, February 12, 2020 / 9:00 am PT. Join us as top cybersecurity and fraud leaders dive deep into the latest attacks, tools, and trends you need to know to protect your web and mobile applications ... Read More

Shape’s VP of Intelligence Center to Speak at Retail Cyber Intelligence Summit

| | Security Trends
Shape’s Vice President of Intelligence Center, Dan Woods, will present at the upcoming Retail Cyber Intelligence Summit on September 24-25, 2019, at the Four Seasons Hotel in Denver, Colorado. 2018 saw a significant increase in user credential spills from retailers. And as the retail industry continues to increase its digitization, ... Read More

The War No One is Talking About

There is a war brewing in cyberspace. The general public is blissfully unaware, and very likely will remain so. The media, when it talks about cybersecurity, tends to focus on the breach of the week, even though there cannot possibly be any lessons left to learn in that parade of ... Read More
Better Together: Partnering with Okta

Better Together: Partnering with Okta

| | Security Trends
Every day, nearly 10 million valid credentials fall into the hands of criminals, fueling massive amounts of fraud. Shape’s new partnership with Okta aims to eliminate this fraud by providing Okta customers an invisible layer of defense against bots, credential stuffing attacks, and account takeover attempts. By implementing both solutions, ... Read More

Shape Honored As Fastest Growing Company in Silicon Valley by Deloitte’s 2018 Technology Fast 500

| | Security Trends
Today Shape was recognized as the fastest-growing company in Silicon Valley and the third-fastest growing company in the U.S. by Deloitte’s Technology Fast 500™, a ranking of the 500 fastest growing technology, media, telecommunications, life sciences and energy tech companies in North America. Rankings are based on a company’s revenue ... Read More

Look, Ma, No Passwords: How & Why Blackfish uses Bloom Filters

When NIST issued guidelines in 2017 advising organizations to check new users’ credentials against a password “breach corpus,” one of the first questions was how to ensure the breach corpus itself didn’t get compromised. Shape’s game-changing product, Blackfish, solved that problem by designing a patented approach to credential storage involving ... Read More

Key Findings from the 2018 Credential Spill Report

In 2016 we saw the world come to grips with the fact that data breaches are almost a matter of when, not if, as some of the world’s largest companies announced spills of incredible magnitude. In 2017 and 2018, we started to see regulatory agencies make it clear that companies ... Read More
Starbucks: Why traditional security methods don't work for ATO

How Starbucks Combats Account Takeover (ATO)

Account Takeovers (ATOs) and credential stuffing represent a huge threat to the retail industry. In fact, they pose major problems for any vertical in which customers tend to reuse passwords for multiple accounts. Password reuse makes compromised credentials even more valuable to cyber criminals. Starbucks recognized this threat more than ... Read More
How Starbucks combats Credential Stuffing and Account Takeover

How Cybercriminals Monetize E-Commerce Fraud

E-commerce fraud has grown to the point where it’s a now a bigger drain on retail profits than shoplifting or inventory shrinkage. Based on the information we’ve gathered defending many of the largest retailers, banks and airlines in the world against cyber crime, there are three attack modes that carry ... Read More