Blog

Blog

Discover the world of identity security, orchestration and authentication. Stay up-to-date with the latest IAM news, industry insights and emerging technologies from Transmit Security.

Blog
The Rise of Malicious Mobile Apps Elicits New Security Recommendations from Regulators 

Authorities in Asia are sounding the alarm in response to a 65.5% spike in scam cases in Singapore in the first half of 2023. Of...

Fraud & Risk
‘Tis the Season to Be Cautious: Holiday Scams & How Retailers Can Prevent Them

As the holiday season approaches, retailers gear up for the busiest shopping period of the year. According to OnlineDasher, global online holiday spending in 2023...

Fraud & Risk
Why API Security Demands an Identity-First Approach

In complex decision-making, a one-size-fits-all approach is rarely effective. And nowhere is this more evident than in the realm of digital security. Applications and users...

Fraud & Risk
Preventing Money Mules: The Impact of Behavioral Analytics in Financial Security

Criminals engage in a variety of illicit activities, such as drug sales, illegal arms trade, and human trafficking, often reaping substantial profits. However, to capitalize...

Blog
Strengthening API Security and Fraud Detection Through Vendor Consolidation

While the rapidly growing use of APIs has provided a way for enterprises to quickly launch new applications and features, they also present a daunting...

Blog
From Static to Dynamic: Why Legacy Risk Engines Can’t Shield Us in Today’s Fraud Frontier

Machine learning, a branch of artificial intelligence (AI), has swiftly permeated many digital security sectors, offering solutions that were once unthinkable. The very essence of...

Blog
What Is APP Fraud, and How Can It Finally Be Stopped?

If you think there’s nothing more insidious than phishing attacks, think again. There’s another form of social engineering that’s even more difficult to prevent. Authorized...

Risk and Fraud Orchestration diagram
Blog
Simplifying Multivendor Management with Risk & Fraud Orchestration

When it comes to fighting fraud, businesses need to use every tool in their arsenal to accurately assess risks in today’s rapidly changing threat landscape....

Account Opening Fraud graphic
Blog
5 Best Practices to Prevent Account Opening Fraud

In today’s hyper-connected world, the dark reality of account opening (AO) fraud looms large. Armed with sophisticated tactics, cybercriminals exploit vulnerabilities in account creation, wreaking...

SIM banner image
Blog
How to Protect Your Customers from SIM Card Attacks: The New Identity Theft Threat

From OTPs and two-factor authentication to registering users’ trusted devices, knowing your users’ mobile phone numbers is an indispensable component of keeping user accounts secure....

Fraud & Risk
Use Cases and Challenges of API Security

Application programming interfaces, or APIs, are the glue that holds modern applications together — making them both indispensable to developers and an increasingly common attack...

Blog
Transmit Security Achieves the Triple Crown — Now Available on AWS, Microsoft Azure and Google Cloud Marketplaces 

Transmit Security is now publicly available on the Google Cloud Marketplace – a significant milestone as we expand our strategic partnerships. This major step enables...

1 2 3 19