Blog

Red squares pattern
Authentication Passed. Audit Failed: Why Organizations Turn to vISO After the Audit
Authentication Passed. Audit Failed: Why Organizations Turn to vISO After the Audit

It’s a situation many organizations quietly recognize. The authentication controls work. The systems are running. The audit checklist appears complete. And yet, when the exam or regulatory review is finished, leadership walks away with a lingering feeling that something isn’t quite aligned. The issue usually isn’t a lack of technical capability.

READ MORE
Common Misconceptions Leadership Teams Have About Compliance Risk
Common Misconceptions Leadership Teams Have About Compliance Risk

When compliance risk comes up in leadership discussions, it’s often framed as a regulatory requirement or something primarily owned by the compliance department. In reality, compliance risk is much broader than a checklist or exam preparation exercise. It reflects how well an organization’s culture, governance, and operations align with regulatory expectations and ethical standards.

READ MORE
Real-Time Detection vs. Post-Event Recovery: Why Fraud Prevention Is Moving Upstream
Real-Time Detection vs. Post-Event Recovery: Why Fraud Prevention Is Moving Upstream

For years, many fraud programs have followed a familiar pattern: a transaction occurs, the case is investigated, the customer is reimbursed if needed, and controls are improved afterward. That approach worked when fraud moved more slowly and transactions had built-in friction, but today the reality is very different.

READ MORE
Testing vs. Assumptions: Are Your Fraud Controls Proven or Just Trusted?
Testing vs. Assumptions: Are Your Fraud Controls Proven or Just Trusted?

Most fraud programs are built on a set of assumptions. We assume the controls we implemented last year still work today. We assume the alerts we tuned are catching what they’re supposed to catch. We assume the controls that passed a test in QA will behave the same way in production.

READ MORE
Top Questions Security Leaders Are Asking Right Now (From the Field)
Top Questions Security Leaders Are Asking Right Now (From the Field)

Talk to enough security leaders, and a pattern emerges. The conversations may start differently - an audit prep call, a vulnerability review meeting, a board discussion - but the same questions tend to surface again and again. They’re not theoretical questions. They come from real operational pressures.

READ MORE
Authentication Isn’t Enough: Why Fraud Is Moving From Identity to Intent
Authentication Isn’t Enough: Why Fraud Is Moving From Identity to Intent

Fraud intelligence signals a clear shift from traditional account takeover to authorized scams, where fully authenticated customers are socially engineered into initiating transactions, often in real time and under AI-enabled impersonation pressure.

READ MORE
Do You Know Where Your Traffic Is Going?
Do You Know Where Your Traffic Is Going?

Prior to 2020, Most organizations had less than 10% of their staff working remotely over a VPN. Even after its peak and following stabilization after the pandemic, it is now not uncommon for 20-30% of staff to work remote at least partially.

READ MORE
What The Hash?
What The Hash?

One of the easiest ways for an attacker to wreak havoc within a network is by leveraging user credentials, which is why user passwords are so sought after. There are many ways for attackers to get their hands on user passwords, but getting cleartext credentials is not as easy as it once was.

READ MORE
What Fraud Teams Are (and Aren’t) Testing Today
What Fraud Teams Are (and Aren’t) Testing Today

During a recent webinar with fraud and risk leaders, we ran a few interactive polls to better understand where organizations are today and what’s causing the most concern looking ahead. The results were telling, and we wanted to share a quick snapshot with you.

READ MORE
Do Your Backups Actually Meet Your RPOs?
Do Your Backups Actually Meet Your RPOs?

A Business Impact Analysis (BIA) identifies critical functions and the impact of disruptions, defining data loss tolerance (RPO), recovery speed (RTO), and maximum allowable downtime (MAD/MTD) to set recovery priorities based on operational, financial, and reputational risk.

READ MORE