<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=41671&amp;fmt=gif">

Connecting the data dots under its own protection

Risk Management Telecom Trends

Practically every company today depends on data to help drive their business. We may be li...

Banking Application Testing Best Practices

BSS/OSS 

“Those (banks) who are managing to get the customer satisfaction formula right, with the r...

Monitoring Online Markets for Point of Sale Fraud Detection

Fraud Management

Have you ever wondered how artificial intelligence and machine learning are linked to blac...

Connected Cars and Data Overflow

Internet of Things (IoT)

With over 200 customers - incl. some of the world’s leading blue chip organizations – WeDo...

How Fraudsters are overcoming increased security

Fraud Management

This is where an integrated approach to security and fraud management is required, so that...

48 million Twitter accounts may be fake

Fraud Management

Approximately 40% of CSP's bad debt is related to subscription fraud. As more businesses u...

Subscribe to our Blog

Give us your comments

Let us know what you thought about this article