Here’s how NuData helped one bank improve user experience without compromising security

Does effective security have to come at the cost of user experience? Here’s how behavioral biometrics improves both. The post Here’s how NuData helped one bank improve user experience without compromising security ...
NuData Sophisticated Attacks Graph

3 key takeaways from our Consumer and Risk Report

How can businesses improve cybersecurity efforts in 2022? By understanding the tactics fraudsters use most. The post 3 key takeaways from our Consumer and Risk Report appeared first on NuData Security ...

How much do fraudsters invest to take down your company?

Over our past few blogs, we’ve explored how device intelligence and behavioral analytics stop fraud in its tracks. But what type of fraud are we talking about, exactly? The post How much ...
Analyst Report: How to Prepare for Ransomware Attacks

Analyst Report: How to Prepare for Ransomware Attacks

Ransomware operations have evolved dramatically in recent months and years, and now leverage advanced tactics to infiltrate an organization. Security and risk management leaders need to look beyond just the endpoints to ...

Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand

The Sodinokibi/REvil ransomware gang has reportedly infected Taiwanese multinational electronics corporation Acer and demanded a ransom of $50 million. Those responsible for the Sodinokibi ransomware strain announced on their data leaks website ...
Microsoft ransomware

Using Behavioral Analytics to Fight Ransomware

The recent attacks on the City of Baltimore and the Norsk Hydro energy facility in Norway are among the latest incidents that show that ransomware, a part of a larger range of ...
Security Boulevard
Consumer IoT Security v1.01

Consumer IoT Security v1.01

They say charity begins at home, well IoT security probably should too. The growing number of Internet enabled and connected devices we populate our homes with continues to grow year on year ...
Deception Technologies: Deceiving the Attacker or the Buyer?

Deception Technologies: Deceiving the Attacker or the Buyer?

Deception technologies, over the last three-ish years, have come into vogue; with more than a dozen commercial vendors and close to a hundred open source products available to choose from. Solutions range ...