Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Payment Data

Below you will find reports with the tag of “Payment Data”

image from The 2024 Crypto Maturity Jouney

The 2024 Crypto Maturity Jouney

The Crypto Maturity Journey outlines considerations for cryptocurrency product rollout, enabling FIs to evaluate market opportunities while simultaneously addressing regulatory and compliance requirements. Over the last few years, cryptocurrency has become a mainstream asset class, with institutional investments as one factor in boosting adoption around the world. Institutions such as BlackRock, Fidelity, and Grayscale have launched Bitcoin and Ethereum ETPs, providing a more accessible avenue for retail and institutional investors to gain exposure to these digital assets.

(more available)
Added: February 18, 2025
image from Threat Intelligence Executive Report 2020 Vol. 4

Threat Intelligence Executive Report 2020 Vol. 4

The Secureworks Counter Threat Unit (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2020, CTU researchers observed notable developments in threat behaviors, the global threat landscape, and security trends, and identified lessons to consider.

(more available)
Added: April 20, 2022
image from Online Purchase Scams Report 2020

Online Purchase Scams Report 2020

This report looks at online purchase scams, going into the overall impact of them, how scammers are engaging with their targets, monetary losses associated with online purchase scams, and the overall risk of an online purchase scam.

(more available)
Added: December 1, 2020
image from The State of Security within eCommerce

The State of Security within eCommerce

A review of the threat volume and characteristics affecting e-commerce.

Added: November 21, 2020
image from Why consumers don’t understand card fraud…

Why consumers don’t understand card fraud…

To understand how consumers felt about card fraud against this changing landscape, we surveyed 4,000 consumers across the U.S. and the U.K. (on February 16 and 17, using Propeller Insights) to get a sense of how impacted they’d been, how concerned they were, and how they wanted their banks, financial services, providers and card issuers to respond to this growing threat.

(more available)
Added: May 11, 2020
image from M-Trends 2020

M-Trends 2020

FireEye has been detecting and responding to cyber attacks every day for over 15 years. The release of M-Trends® 2020 marks 11 years of providing the cyber security community with insights gained from the frontlines of those attacks.

(more available)
Added: March 1, 2020
image from Analysis: Pricing of Goods and Services on the Deep & Dark Web

Analysis: Pricing of Goods and Services on the Deep & Dark Web

The survey results and relevant observations are as follows: The inner workings of this underground economy havecome to play an influential role in many of the cyberand physical risks facing organizations today. Toenhance the context within which these illicit goodsand services are obtained, abused, and ultimatelycontribute to such risks, Flashpoint analysts conducteda survey of the prices for various offerings listed forsale across the Deep & Dark Web. While analysts’findings should be interpreted as case studies andgeneral observations rather than precise statistics, thisreport can and should serve to inform the security andrisk strategies of organizations across all sectors.

(more available)
Added: February 18, 2020
image from 2019 Payment Security Report

2019 Payment Security Report

The PSR has the unique role of measuring the strengths and weaknesses of the PCI DSS and tracking the sustainability of compliance. It also measures and tracks challenges associated with implementing and maintaining security controls required for PCI DSS compliance.

(more available)
Added: November 25, 2019
image from Retail and Hospitality Threat Trend Report

Retail and Hospitality Threat Trend Report

This report covers trends in retail and hospitality in 2019. It covers Cyber espionage that impacts hospitality, how virtual skimming threat data poses risk to payment card data, and an analysis and comparison of point-of-sale malware companies.

(more available)
Added: September 18, 2019
image from Travel Cybersecurity Study: May 2019

Travel Cybersecurity Study: May 2019

This poll was conducted from April 23-24, 2019, among a national sample of 2201 U.S. Adults. The interviews were conducted online and the data were weighted to approximate a target sample of Adults based on age, race/ethnicity, gender, educational attainment, and region. Results from the full survey have a margin of error of plus or minus 2 percentage points.

(more available)
Added: July 10, 2019
image from The PSD2 Tracker: March 2019

The PSD2 Tracker: March 2019

This monthly report offers insight into PDS2 regulations and devleopments.

Added: May 18, 2019
image from 2019 Tax Season Threat Roundup

2019 Tax Season Threat Roundup

This unique report takes a hard look at scams that focus on tax reporting and the filing of taxes.

Added: April 19, 2019
image from The Tactics & Tropes of the Internet Research Agency

The Tactics & Tropes of the Internet Research Agency

Upon request by the United States Senate Select Committee on Intelligence (SSCI), New Knowledge reviewed an expansive data set of social media posts and metadata provided to SSCI by Facebook, Twitter, and Alphabet, plus a set of related data from additional platforms. The data sets were provided by the three primary platforms to serve as evidence for an investigation into the Internet Research Agency (IRA) influence operations.

(more available)
Added: March 26, 2019
image from Cybersecurity Risk, Response And Reward

Cybersecurity Risk, Response And Reward

From the report, “As 2019 approached, ControlScan and MAC once again partnered to organize and conduct an industry study; however, this time we decided to reach out to the SMB merchants themselves. Measuring successes and concerns from the MSP’s perspective had given us part of the equation, so we wanted to learn how well aligned SMBs are with the efforts being aimed at them.” Read on to find out more.

(more available)
Added: March 16, 2019
image from Major 3rd-PARTY Data Breaches of 2018

Major 3rd-PARTY Data Breaches of 2018

3rd-party (aka supply-chain) cyber attacks were one of the main reasons for major data breaches in 2018. Here is a recap of 3rd-party data breaches that hit the news in 2018

(more available)
Added: March 6, 2019
image from 2018 Airlines Phishing Report

2018 Airlines Phishing Report

Phishing domains pose a significant cyber risk for major airlines. Learn how many phishing domains for major airlines there are and how to find them.

(more available)
Added: March 6, 2019
image from Insider Hacks: Fighting Fraud for Online Games

Insider Hacks: Fighting Fraud for Online Games

Scott Adams has been at the front lines fighting fraud in the world of online games as former Vice-Chair Merchant Board at Payments Ed Forum, and former Director of Fraud and Risk Management at Riot Games. For nearly four years, he led his group to greatly reduce fraud and increase account security for the millions of people who play League of Legends worldwide. Scott’s experience and expertise includes Payment Processing, Anti-Fraud/Chargeback Management, and Connecting the Marketing/Business Departments with Customer Service and Information Technology Departments (Cross-Departmental Communications). Kount asked him to share his industry expertise and insights for combating card-not-present (CNP) fraud in the Online Games market.

(more available)
Added: February 16, 2019
image from A New Timescale For Fraud Science: Insights From Our CSO

A New Timescale For Fraud Science: Insights From Our CSO

From the report, “At Feedzai, we recently completed a project: building a machine learning system to perform transaction fraud detection for a global payment service provider. This client does over a million transactions a day. We designed, trained, tested, and compared hundreds of models in just over a month. In the end we achieved a 16 percentage point increase in money recall with 20x fewer alerts. The fact that we’re continuing to deliver on projects of this scale, in this speed, makes me excited for the future. In this paper, I want to discuss why speed of data science matters, why we’re able to achieve it, and why it helps us deliver value for enterprises fighting fraud. ” Read on to find out more.

(more available)
Added: February 13, 2019
image from High Score: Set A Revenue High Score By Defeating Video Game Fraud

High Score: Set A Revenue High Score By Defeating Video Game Fraud

From the report, “Each marketplace has to approve each game being sold, which gives your company credibility. Consumers also have the ability to rate the games with reviews in order to warn others about a game or a developer. Adding the consumer reviews is a layer of credibility for your game, as long as the reviews are positive. Being able to sell games directly online is great for merchants, but also opens them up to the possibility of fraud and chargebacks.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Profile of A Fraudster

Profile of A Fraudster

This report offers insight into 6 different fraud profiles in the online world.

Added: February 13, 2019
image from The Dawn Of Machine Learning For Banking And Payments

The Dawn Of Machine Learning For Banking And Payments

From the report, “The advent of big data happened to coincide with the advent of better computing, better algorithms, and new AI-focused organizations, allowing us to take this data and turn it into something even better: meaning. This brings us to machine learning. Later in this guide, we’ll look at how machine learning works and how it can work for you. But first, let’s take a closer look at all the ingredients that got us here.” Read on to learn more.

(more available)
Added: February 13, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)