Many security companies can lock your front door, but DataVisor بنیانگذار و مدیر عامل شرکت Yinglian Xie said focusing on every area of the house is a much more effective strategy for fighting fraud. DataVisor combines applied machine learning capabilities, investigative workflows and an intelligence network of more than four billion accounts to provide real-time fraud signals, insights, and protection.
Xie has long worked with machine learning. As society became increasingly digitized, she saw attackers change tactics. That left companies vulnerable.
How AI evolved to fight fraud
Artificial intelligence and machine learning were needed. Xie saw that combined with ابر بومی technology, envisioning the mix embedded into platforms to proactively fight fraud.
She said artificial intelligence has become a more useful contributor to the fraud fight. Early versions were data-driven and were trained on historical data. Humans analyzed attacks, determined how they veered from normal and defined a rule set. Such an approach is suboptimal, based on experience, and error-prone.
A reactive strategy is ineffective when faced with new attack vectors. With no history, they’re stuck. Considering that some fraud goes unreported, databases are incomplete.
“That’s where we want to apply AI,” Xie said.
Those models are based on supervised machine learning. Models based on unsupervised machine learning address the shortcomings of labelling data types. These models identify natural groupings. Xie said it’s a powerful way to detect unknown fraud types.
Generative AI will further boost the fraud fight – on both sides
Today, generative AI is even more powerful. It turns human knowledge into models much faster through its data-processing ability. The next step is for generative AI models to deliver explainability of their results.
Xie said generative AI helps address the competing forces of friction and user experience. If the technology is good but comes with friction, no one will use it. The same goes if it’s bad but quick.
A big problem is that fraudsters have access to generative AI, too. It allows them to conduct campaigns beyond the authorization stage, which many companies focus on. Verification techniques based on credentials, passwords, secret questions and basic face recognition are rendered less effective. Voices and images can be synthesized from readily available online data.
Effective strategies must adopt more holistic approaches. They assume faces and voices can be mimicked at the entry point, so they look for abnormalities in your network activity. Are there changes in where and when you log in? Have there been changes in your travel behavior?
Multiply that by millions or billions of users. You can spot emerging fraud trends in near real-time.
How DataVisor protects the entire house
Xie said DataVisor secures the front door, but it focuses equally on every room in the house. There must be a constant level of protection throughout the user experience.
With that focus, there is constant activity monitoring. Attackers leave clues that differentiate their activity from the user’s when compared broadly.
“I can install the lock at the door, but you have to look at the sensors around the house,” Xie said. “Where do they call from? When do they transact? How much do they transact for, and what’s the network origin? They can’t avoid that; they have to have those things.”
There’s no silver bullet
Xie believes passkeys and verified digital identities have their places. They make for more powerful locks on the front doors. An ecosystem of approaches protects the rest of the house, too. DataVisor works with a series of partners to augment its services.
“There’s no silver bullet,” Xie admitted. “We have to have all these together while raising the bar for the attackers.”
And there’s one factor no system in the world can protect people from – themselves. Phishing scams and the like trick victims before the technology gets a chance.
“Attackers don’t need to break the lock,” Xie said. “They can break people.”
Are there opportunities via open data measures and encryption techniques to safely access larger data pools to improve security measures? There are, but there’s easier progress to be had.
“I don’t think we lack data,” Xie said. “Everybody has a lot of data, right? Some low-hanging fruit is that everybody has a lot to mine out of their data before they even come to share. That’s where I think we can still do low-hanging fruit while waiting for the encryption privacy.”
همچنین بخوانید:
2023 was a big year for DataVisor. In December, they announced an integration with Twilio that provides customers with enhanced fraud protection through end-user authentication and verification capabilities. That came weeks after NYMBUS chose DataVisor to provide digital banking fraud monitoring.
Over the summer, DataVisor shook hands with Q6 Cyber, a cyber and fraud threat intelligence firm, to centralize relevant threat intelligence data in a single platform. DataVisor marked a new partnership with DCI in May to better protect the latter’s customers from fraud.
.pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .box-header-title { font-size: 20px !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .box-header-title { font-weight: bold !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .box-header-title { color: #000000 !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-avatar img { border-style: none !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-avatar img { border-radius: 5% !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-name a { font-size: 24px !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-name a { font-weight: bold !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-name a { color: #000000 !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-description { font-style: none !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-description { text-align: left !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-meta a span { font-size: 20px !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-meta a span { font-weight: normal !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-meta { text-align: left !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-meta a { background-color: #6adc21 !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-meta a { color: #ffffff !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-meta a:hover { color: #ffffff !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-user_url-profile-data { color: #6adc21 !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-twitter-profile-data span, .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-twitter-profile-data i { font-size: 16px !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-twitter-profile-data { background-color: #6adc21 !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-twitter-profile-data { border-radius: 50% !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-twitter-profile-data { text-align: center !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-linkedin-profile-data span, .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-linkedin-profile-data i { font-size: 16px !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-linkedin-profile-data { background-color: #6adc21 !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .ppma-author-linkedin-profile-data { border-radius: 50% !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-author-boxes-recent-posts-title { border-bottom-style: dotted !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-multiple-authors-boxes-li { border-style: solid !important; } .pp-multiple-authors-boxes-wrapper.box-post-id-45383.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode.box-instance-id-1 .pp-multiple-authors-boxes-li { color: #3c434a !important; }
- محتوای مبتنی بر SEO و توزیع روابط عمومی. امروز تقویت شوید.
- PlatoData.Network Vertical Generative Ai. به خودت قدرت بده دسترسی به اینجا.
- PlatoAiStream. هوش وب 3 دانش تقویت شده دسترسی به اینجا.
- PlatoESG. کربن ، CleanTech، انرژی، محیط، خورشیدی، مدیریت پسماند دسترسی به اینجا.
- PlatoHealth. هوش بیوتکنولوژی و آزمایشات بالینی. دسترسی به اینجا.
- منبع: https://www.fintechnexus.com/datavisor-protects-the-entire-house-from-fraud/
- : دارد
- :است
- :نه
- :جایی که
- 000
- 1
- 2018
- 300
- a
- توانایی
- دسترسی
- حساب ها
- فعالیت
- نشانی
- پذیرفته
- اتخاذ
- پس از
- AI
- مدل های هوش مصنوعی
- معرفی
- اجازه می دهد تا
- an
- تجزیه و تحلیل
- و
- اعلام کرد
- اعمال می شود
- درخواست
- روش
- رویکردها
- هستند
- محدوده
- دور و بر
- مقالات
- مصنوعی
- هوش مصنوعی
- AS
- فرض
- At
- حمله
- حمله
- تقویت کردن
- تصدیق
- مجوز
- در دسترس
- نماد
- اجتناب از
- بد
- بانکداری
- بار
- مستقر
- اساسی
- BE
- شد
- شدن
- بوده
- قبل از
- رفتار
- معتقد است که
- بهتر
- خارج از
- بزرگ
- بیلیون
- میلیاردها
- بلاکچین
- جسور
- بالا بردن
- هر دو
- شکستن
- گسترده
- اما
- by
- صدا
- آمد
- مبارزات
- CAN
- قابلیت های
- مرکز
- متمرکز کردن
- مدیر عامل شرکت
- شانس
- تغییر دادن
- تبادل
- را انتخاب
- بنیانگذاران
- رمز
- رنگ
- COM
- ترکیب شده
- ترکیب
- بیا
- می آید
- شرکت
- مقایسه
- رقابت
- رفتار
- با توجه به
- ثابت
- شرکت کننده
- مجوزها و اعتبارات
- Crowdfunding
- مشتریان
- سایبر
- داده ها
- پردازش داده ها
- داده محور
- پایگاه های داده
- دسامبر
- نجیب
- مشخص
- ارائه
- تشخیص
- مشخص
- تمایز
- دیجیتال
- بانکداری دیجیتال
- رقمی شده
- do
- آیا
- توسط
- درب
- در اوایل
- آسان تر
- اکوسیستم
- موثر
- جاسازی شده
- سنگ سنباده
- فن آوری های نوظهور
- رمزگذاری
- افزایش
- تمام
- ورود
- به همان اندازه
- حتی
- هر
- هر کس
- تکامل
- تجربه
- قابل توضیح
- چهره
- تشخیص چهره
- در مواجهه
- چهره ها
- عامل
- سریعتر
- مبارزه کردن
- مبارزه با
- fintech
- شرکت
- تمرکز
- تمرکز
- تمرکز
- برای
- نیروهای
- چهار
- تقلب
- کلاهبرداران
- اصطکاک
- از جانب
- جلو
- بیشتر
- مولد
- هوش مصنوعی مولد
- می رود
- خوب
- بود
- دست ها
- آیا
- he
- کمک می کند
- تاریخی
- تاریخ
- جامع
- هنگ
- هنگ کنگ
- میزبانی
- خانه
- در تردید بودن
- چگونه
- HTML
- HTTPS
- انسان
- انسان
- i
- شناسایی
- هویت ها
- if
- تصاویر
- بهبود
- in
- به طور فزاینده
- بینش
- نصب
- ادغام
- اطلاعات
- به
- تحقیقی
- IT
- ITS
- روزنامه نگار
- JPG
- تنها
- دانش
- کنگ
- برچسب زدن
- عدم
- بزرگتر
- یادگیری
- ترک کردن
- ترک کرد
- امانت دادن
- کمتر
- سطح
- پسندیدن
- لینک
- قفل
- قفل
- ورود به سیستم
- طولانی
- نگاه کنيد
- خیلی
- دستگاه
- فراگیری ماشین
- ساخت
- بسیاری
- علامت گذاری شده
- حداکثر عرض
- ممکن است..
- معیارهای
- میلیون ها نفر
- مال من
- مخلوط
- مدل
- مدرن
- نظارت بر
- بیش
- بسیار
- باید
- طبیعی
- نزدیک
- نیاز
- ضروری
- شبکه
- جدید
- بعد
- نه
- هیچ
- طبیعی
- نیمبوس
- of
- on
- ONE
- آنلاین
- باز کن
- داده های باز
- فرصت ها
- or
- منشاء
- اصلی
- خارج
- روی
- پانل
- شرکای
- همکاری
- کلمه عبور
- گذشته
- همکار برای همکار
- وام همتا
- مردم
- فیشینگ
- کلاهبرداری فیشینگ
- اماکن
- سکو
- سیستم عامل
- افلاطون
- هوش داده افلاطون
- PlatoData
- نقطه
- استخرها
- قوی
- خلوت
- PRNewswire
- مشکل
- پیشرفت
- محافظت از
- حفاظت
- محافظت می کند
- ارائه
- فراهم می کند
- سوالات
- سریع
- بالا بردن
- خواندن
- به راحتی
- زمان واقعی
- به رسمیت شناختن
- مربوط
- ارائه شده
- REST
- نتایج
- راست
- اتاق
- قانون
- s
- با خیال راحت
- سعید
- همان
- دید
- کلاهبرداری
- راز
- امن
- تیم امنیت لاتاری
- اقدامات امنیتی
- سنسور
- سلسله
- خدمات
- تنظیم
- هفت
- اشتراک گذاری
- او
- تکان داد
- کاستی ها
- سیگنال
- نقره
- تنها
- So
- جامعه
- جامد
- برخی از
- فضاها
- محدوده
- Spot
- صحنه
- گام
- هنوز
- استراتژی ها
- استراتژی
- زیرمجموعه
- چنین
- تابستان
- قله
- سیستم
- تاکتیک
- تکنیک
- فن آوری
- پیشرفته
- نسبت به
- که
- La
- جهان
- شان
- آنها
- خودشان
- آنجا.
- اینها
- آنها
- اشیاء
- فکر می کنم
- کسانی که
- تهدید
- تهدید هوش
- از طریق
- سراسر
- به
- با هم
- تونی
- هم
- آموزش دیده
- معامله کردن
- سفر
- روند
- تبدیل
- Twilio
- توییتر
- انواع
- نامحدود
- ناشناخته
- استفاده کنید
- مفید
- کاربر
- سابقه کاربر
- کاربران
- تایید
- تایید
- از طريق
- قربانیان
- صداها
- آسیب پذیر
- منتظر
- می خواهم
- بود
- مسیر..
- we
- هفته
- بود
- چه زمانی
- که
- در حین
- اراده
- با
- مشغول به کار
- گردش کار
- با این نسخهها کار
- جهان
- کتبی
- سال
- سال
- شما
- شما
- زفیرنت