Biometrics , Enterprise Mobility Management / BYOD , Fraud Management & Cybercrime

Mitigating the Maturing Mobile Threat

BioCatch's Uri Rivner on the Role of Behavioral Biometrics
Mitigating the Maturing Mobile Threat
Uri Rivner, BioCatch

For years now, security experts have been predicting 'the year mobile threats come of age.' Is it finally here? BioCatch's Uri Rivner discusses the recent surge in mobile threats - and what to do about them.

Rivner, co-founder and head of cyber strategy at BioCatch, outlines his view of the flood of threats against organizations of all sizes and sectors. Specifically, he sees a flood of device malware, remote access attacks and social engineering via mobile. What's driving this surge? In part, Rivner says, it's because organizations are bringing the same processes and functionalities to mobile that they used in other channels, which also were vulnerable to attacks.

"The vulnerability has always been there," Rivner says. "There's nothing new about these attacks. It's not like [fraudsters] have tools now that they didn't have five years ago. But now the functionality is there; the business justification is there. And what we're going to see very quickly is ... the entire fraud ecosystem realizing that now they have to focus on mobile. Do the same thing that they did in the PC environment."

In an interview about how to mitigate emerging mobile threats, Rivner discusses:

  • The recent surge in mobile exploits;
  • The role of behavioral biometrics in mitigating these threat;
  • How BioCatch helps customers improve their defenses.

Uri is recognized globally as an industry expert on Cybercrime and advanced threats. He is a regular speaker in the leading Security and Cyber conferences, and writes a cyber-security blog read by thousands of professionals. Prior to joining BioCatch he served as Head of New Technologies, Identity Protection at RSA. Over the years Uri worked closely with the world's largest financial institutions on developing solutions against online crime, Phishing and Trojans, and helped other industry verticals establish an effective defense doctrine against advanced cyber threats. He was a key player in developing anti-Cybercrime technologies used today by thousands of organizations worldwide to stop billions of dollars in fraud each year and protect hundreds of millions of users.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.