Fraud Management & Cybercrime

Digital Identity: Top Challenges and Solutions

Trusteer's Shaked Vax on Fraud Prevention Essentials
Shaked Vax, Trusteer products strategist, IBM Security

By rolling out the latest digital identity capabilities and fraud-fighting technologies, organizations can take a bigger bite out of cybercrime, says Shaked Vax of IBM Security's Trusteer.

See Also: Webinar | Passwords: Here Today, Gone Tomorrow? Be Careful What You Wish For.

Emerging, high-impact strategies typically blend more sophisticated approaches to digital identity, backed by greater machine learning, cyber threat intelligence and fraud analysis, to more accurately detect and block fraudsters with minimum false positives, he says.

In a video interview at Information Security Media Group's recent Cybersecurity Summit in New York, Vax also discusses:

  • Top fraud prevention and digital identity life cycle challenges;
  • Emerging cybersecurity strategies and how they can best be applied;
  • The potential benefits and drawbacks of machine learning and artificial intelligence.

Vax is Trusteer products strategist at IBM Security. He previously held a number of other positions at IBM as well as at Mobixell Networks, Radware, Check Point Software Technologies and Compulite Systems.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.