Shape SecurityinShape SecurityHow Much Does Credential Stuffing Cost Your Business?Eight years ago, there wasn’t even a term for the practice of testing consumers’ stolen credentials against multiple e-commerce sites to…3 min read·Aug 21, 2018----
Shape SecurityinShape SecurityKey Findings from the 2018 Credential Spill ReportIn 2016 we saw the world come to grips with the fact that data breaches are almost a matter of when, not if, as some of the world’s largest…4 min read·Jul 30, 2018----
Shape SecurityinShape SecurityHow Starbucks Combats Account Takeover (ATO)Account Takeovers (ATOs) and credential stuffing represent a huge threat to the retail industry. In fact, they pose major problems for any…4 min read·Jun 28, 2018----
Shape SecurityinShape SecurityHow Cybercriminals Monetize E-Commerce FraudE-commerce fraud has grown to the point where it’s a now a bigger drain on retail profits than shoplifting or inventory shrinkage. Based on…4 min read·Jun 12, 2018----
Shape SecurityinShape SecurityHow Big Banks Fight Online FraudThree top strategies fraudsters use against banks — and how they can be defeated.4 min read·Apr 19, 2018----
Shape SecurityinShape SecurityComplying with NIST Guidelines for Stolen PasswordsIt seems everyone today is talking about stolen passwords, but this is an older problem than people realize. Protecting your enterprise…6 min read·Mar 1, 2018----
Shape SecurityinShape SecurityKey Takeaways: Retail Threat Briefing Webinar with R-CISCIn the era of Amazon and mainstream e-commerce, every online retailer has to deliver a compelling user experience across their web and…3 min read·Feb 27, 2018----
Shape SecurityinShape SecurityBiggest Threat to Retail? (hint: it’s not Amazon)Retailers lost a whopping $57B to online attacks in 2017, eclipsing losses from shoplifting and inventory shrinkage. The biggest online…4 min read·Feb 9, 2018----
Shape SecurityinShape SecurityHow to eliminate the use of stolen passwordsToday we’re releasing Blackfish, a system that proactively protects companies from credential stuffing before an attack takes place…5 min read·Nov 7, 2017----
Shape SecurityinShape SecurityHow Cybercriminals Bypass CAPTCHAOne thing the world can consistently agree on is that CAPTCHAs are annoying. The puzzle always appears in the most inconvenient of places…8 min read·Jul 12, 2017----