All posts by Boaz Krelbaum

employee fraud collusion

Identify & Eliminate Fraud Collusion, Part 5

So at this point you’ve done all the dirty work necessary to (mostly) lock down your network. You’re monitoring activity in real time, taking the context of behaviors into consideration, and you’re looking at the...

/ April 27, 2018

The business of BEC: Hackers are serious about the business of fraud. Are you?

There’s no question that fraud (especially business email compromise) is rising aggressively, with 75% of companies reporting they have fallen victim to a fraud incident within the past year. As new technologies emerge, fraudsters are...

/ November 14, 2017
fraud collusion part 4

Identify & Eliminate Fraud Collusion, Part 4

Sometimes, catching insider collusion comes down to plain old common sense...

/ November 9, 2017
fraud collusion

Identify & Eliminate Fraud Collusion, Part 3

Monitoring user behavior and understanding that behavior in the context of typical network traffic are keys to building a solid security strategy that protects your organization from employee fraud collusion. It’s important to take that a...

/ September 26, 2017
Fraud collusion

Identify & Eliminate Fraud Collusion, Part 2

Monitoring user behavior is the most important first step you can take to protect your organization against insider fraud losses. Monitoring activity alone however isn’t enough. To more accurately identify fraud attempts it’s important to...

/ September 15, 2017
fraud collusion in banks

Identify & Eliminate Fraud Collusion, Part 1: A Guide for Banks

Clearly organizations have to take fraud collusion into account when crafting their security plan, or else run the risk of potentially significant financial losses and a damaged reputation. But how? The good news is that...

/ September 5, 2017

What Security Protections Should You Expect From a Banking Partner?

As organizations undergo the arduous process of selecting banking partners, one of the critical factors they must evaluate is the security of the institution. This aspect of the process cannot be understated. It has to...

/ May 19, 2017

3 Lessons Preparing for the Zombie Apocalypse Can Teach You About Protecting Patient Data Against Cyber Attacks

Zombies are exactly like the cyber criminals we fight against every day to protect patient data. They’re everywhere you turn, they’re a seemingly unstoppable force, and they’ve got to be stopped, or else we’ll lose...

/ May 9, 2017

Slaying the Malware Beast

Malware is hardly a new threat in the security landscape. Banking Trojans that specialize in stealing user credentials, hijacking authenticated sessions and manipulating transactions in order to steal funds have been around since the inception...

/ May 9, 2017

Yogi Berra, Cyber-Security Visionary?

Yogi Berra's wisdom is appropriate in many situations, including cyber security. Who knew we could learn so much from a grumbly old baseball catcher from Missouri…

/ May 9, 2017