Mitigate Security Threats and Keep Accounts and Identities Safe

Recent Fraud and Security Research

Reports

The Understated Cyber Vulnerabilities of Wealth Management Clients

Phishing attacks remain the most pervasive and concerning for wealth clients, but cybersecurity risk as a whole is a growing worry for financial advisors, who feel increasingly ill-equipped to support their clients with and around cyberthreat mi...

Deepfake Accountability: Overcoming Hurdles to Effective Legislation

Deepfakes are not new to the financial services industry, nor are they a new threat to consumers. But artificial intelligence has contributed to the rapid increase in deepfake-related fraud and scams that are being inflicted on U.S. consumers. N...

Real-Time Defenses: Fraud Prevention in a Blended Threat Era

This report, sponsored by Mitek, explores the immediate and long-term risks associated with identity fraud that stems from criminals’ use of a combination of traditional and new data sources and advanced tactics. This report further establishes ...

Multi-Layered Fraud Defense: Strategies for Evolving Threats

This report, sponsored by TransUnion, explores how identity fraud continues to evolve across new and existing accounts, exposing weaknesses in traditional identity verification and authentication processes. This report highlights why many busine...

Blended threats, real-time defenses: Confronting the rise of identity fraud in 2025

Fraud experts Jennifer Pitt from Javelin and Carmel Maher from Mitek as they break down key takeaways from the Javelin 2025 Identity Fraud Study: Breaking Barriers to Innovation. We explore how today’s hybrid fraud landscape demands a new genera...

The Hidden Enemy: Iran’s Cyberthreat to U.S. Banks

Disinformation is among the leading cyber risks predicted in the wake of the June 21 U.S. strikes on Iran’s nuclear program. On June 22, the Department of Homeland Security issued an alert about increased cyber risk to critical infrastructure be...

Unmasking Scambiguity: Tackling the Scam Threat With Clarity and Confidence

This report, sponsored by BioCatch, explores five key scam typologies (purchase scams, romance scams, investment scams, bank impostor scams, and government agent impostor scams) currently used by criminals to target various groups of U.S. consum...

Account Takeover: Static Authentication Enables Access Without Confirmation

Account takeover (ATO) is surging, and the problem is getting dimensionally worse. Banks that rely on outdated, one-time authentication and static identity verification strategies are unable to combat this problem against criminals employing sop...

Unmasking Scambiguity: Tackling the Scam Threat with Clarity and Confidence

As scams surge in volume and complexity, financial institutions are grappling with a critical challenge: ‘scambiguity’—the lack of clarity in how scams are defined, tracked, and tackled.

Zero Trust Hinges on Cyber Strategy, Not Technology

Compliance will never equate to security, and zero trust will never hinge on technology. Zero trust is built and secured via a solid corporate culture and cybersecurity strategy that is constantly reinforced, supported, and preached. Zero trust ...

Book a call with a fraud & security analyst