In This Section

The Future of Voice, Fraud, and the Impact to CX | A Recap

Voice is growing out of the call center, out of your telephone and is growing into the next interface. In previous years, we have released fraud reports revolving around the call center, but with the expansion of voice, and the fraud that follows, we have shifted our perspective to voice intelligence – after all, voice is everywhere: your digital assistant,…
April 9, 2014
Phone security on the radio
Last week, I sat down with Dana Barrett of the Wall Street Business Network to talk about our company’s technology and how organizations can use…
Read More →
January 20, 2014
New York Times talks phone fraud
Fake emails are usually pretty easy to spot because you can look and see if it came from Bank of America or from FreeEmailAddressInEgypt(dot)com,” said…
Read More →
November 21, 2013
Know Your Fraudster
Today Pindrop Security released “KYF: Know Your Fraudster,” our 2013 Phone Fraud Report. You already Know Your Customer (KYC), time to know the other callers…
Read More →
September 27, 2013
Right person, right phone, right place
There are not a lot of surprises in the security world. With email, web, database, etc., the model has looked basically the same. Figure out…
Read More →
September 27, 2013
Six Degrees of Phone Fraud
If you are like me, the never ending stories on hackers breaking into businesses don’t even merit a passing glance anymore. We never stop to…
Read More →
September 6, 2013
Travel in style
A happy Pindrop customer wearing his Pindrop T on an elephant in Thailand! Must be tracking down fraudsters!
Read More →
July 30, 2013
Internet-like Attacks Are Already Targeting the Telephony Channel
I just finished a series of blog posts asserting that the telephony landscape has changed fundamentally. Unfortunately, evidence abounds. In the “Demise of POTS: An…
Read More →
July 24, 2013
Telephony Going the Internet Way: Multi-layered Approach for Countering Emerging Threats
Telephony going the Internet way is the title of this series of blog posts. In this concluding post on this topic, let us revisit the…
Read More →
July 23, 2013
Black Hat, Defcon & The ALL-IN Party
Next week, the week of July 29, is the Black Hat Conference in Las Vegas. The annual hacker meetup is not your traditional conference. The…
Read More →
July 19, 2013
Telephony Going the Internet Way: Secure Phone Fingerprinting
Last week we discussed a number of requirements for phone authentication solutions. Ideally, we want both high accuracy and strong security. This means low false…
Read More →
July 10, 2013
Telephony Going the Internet Way: Voice Biometrics
Voice biometrics, where characteristics of a speaker’s voice are used to authenticate him or her, is a recent development from the long history of speech…
Read More →
June 26, 2013
Telephony Going the Internet Way: Pitfalls of Knowledge-Based Authentication
In Caller-ID Spoofing we discussed how difficult it is to verify a caller. Why does that matter? Because banks are losing millions of dollars in fraudulent…
Read More →
2019 Voice Intelligence Webinar Series – where voice, not touch is the main interface for customers.