Shape SecurityinShape SecurityHow Much Does Credential Stuffing Cost Your Business?Eight years ago, there wasn’t even a term for the practice of testing consumers’ stolen credentials against multiple e-commerce sites to…Aug 21, 2018Aug 21, 2018
Shape SecurityinShape SecurityKey Findings from the 2018 Credential Spill ReportIn 2016 we saw the world come to grips with the fact that data breaches are almost a matter of when, not if, as some of the world’s largest…Jul 30, 2018Jul 30, 2018
Shape SecurityinShape SecurityHow Starbucks Combats Account Takeover (ATO)Account Takeovers (ATOs) and credential stuffing represent a huge threat to the retail industry. In fact, they pose major problems for any…Jun 28, 2018Jun 28, 2018
Shape SecurityinShape SecurityHow Cybercriminals Monetize E-Commerce FraudE-commerce fraud has grown to the point where it’s a now a bigger drain on retail profits than shoplifting or inventory shrinkage. Based on…Jun 12, 2018Jun 12, 2018
Shape SecurityinShape SecurityHow Big Banks Fight Online FraudThree top strategies fraudsters use against banks — and how they can be defeated.Apr 19, 2018Apr 19, 2018
Shape SecurityinShape SecurityComplying with NIST Guidelines for Stolen PasswordsIt seems everyone today is talking about stolen passwords, but this is an older problem than people realize. Protecting your enterprise…Mar 1, 2018Mar 1, 2018
Shape SecurityinShape SecurityKey Takeaways: Retail Threat Briefing Webinar with R-CISCIn the era of Amazon and mainstream e-commerce, every online retailer has to deliver a compelling user experience across their web and…Feb 27, 2018Feb 27, 2018
Shape SecurityinShape SecurityBiggest Threat to Retail? (hint: it’s not Amazon)Retailers lost a whopping $57B to online attacks in 2017, eclipsing losses from shoplifting and inventory shrinkage. The biggest online…Feb 9, 2018Feb 9, 2018
Shape SecurityinShape SecurityHow to eliminate the use of stolen passwordsToday we’re releasing Blackfish, a system that proactively protects companies from credential stuffing before an attack takes place…Nov 7, 2017Nov 7, 2017
Shape SecurityinShape SecurityHow Cybercriminals Bypass CAPTCHAOne thing the world can consistently agree on is that CAPTCHAs are annoying. The puzzle always appears in the most inconvenient of places…Jul 12, 2017Jul 12, 2017