Resources STAY CONNECTED, STAY INFORMED, STAY AHEAD

Pindrop Pulse is a resource hub for everything from the basics of voice fraud and security, to advanced topics and discussions happening in the industry. Take your knowledge to the next level.

Pulse | Blog

Voice Phishing: How to Protect Yourself from Phone-Based Scams


November 29, 2023

We will explore voice phishing, its definition, how it operates, common variations of voice phishing scams, and, most importantly, how you can identify and prevent these attempts to protect your personal information.

READ HERE
Pulse | Blog

Phone Scams to Watch For in 2024


November 20, 2023

Phone scams can be a serious source of problems for many businesses, including contact centers. Unfortunately, employees are often the most vulnerable part of the business. If an employee does not know about potential phone scams, they may struggle to keep confidential data safe. 

READ HERE
Pulse | Blog

The Benefits of Biometric Liveness in Fraud Detection


November 20, 2023

Biometric authentication was once the most robust security measure. It used hard-to-impersonate biological traits like fingerprints to verify identity. However, nowadays, biometric authentication is not all secure. Fraudsters can bypass the authentication with 3D-printed masks, fake fingerprints, and eye replicas.

READ HERE

What type are you interested in?

Pulse | Blog

Why OTPs Ceased Catching Those OTP (On the Prowl)


April 21, 2021

Read this blog to discover the key reasons why OTPs may no longer provide the best security and why it is important to have an authentication technology based on credentials and risk criteria extracted from a call.

Learn More
Pulse | Video

What is Toneprinting?

Watch Now
Pulse | Webinar

Anatomy of an IVR Fraud Attack & Lessons Learned


May 6, 2021 @ 1:00 pm - 1:30 pm EST
Vijay Balasubramaniyan

Watch Now
Pulse | Blog

Facebook Breach Means More Munitions for Fraudsters ATO Attempts


April 9, 2021

The leaked data initially functioned as a database for hackers to query users’ facebook accounts and matching telephone numbers. The information tied to a phone number is exactly the information needed by fraudsters to begin to social engineer contact center agents and take over customer accounts.

Learn More
Pulse | Webinar

Part 3: Authentication 101 - Passport by Pindrop

Part 3 of 3


April 15, 2021 @ 1:00 pm - 1:30 pm EST
Amit Gupta

Watch Now
Pulse | Webinar

Part 2: Authentication 101 - VeriCall by Next Caller, a Pindrop Company

Part 2 of 2


April 8, 2021 @ 1:00 pm - 1:30 pm EST
Sam Espinosa (Next Caller)

Watch Now
Pulse | Video

Why should enterprises consider the move to a cloud based Contact Center?

Watch Now
Pulse | Webinar

Part 1: The Power of Customer Authentication

Part 1 of 3


April 1, 2021 @ 1:00 pm - 1:30 pm EST
Amit Gupta & Sam Espinosa (Next Caller)

Watch Now
Pulse | Blog

The Law of Unintended Consequences


March 10, 2021

Unintended consequences is a popular topic when it comes to security. In many ways, security involves the study of unintended consequences, as we monitor and measure how effective those controls remain through tests of intended and unintended real-world consequences.

Read Here