Keshia Rose photo

Keshia Rose

Role

Senior Developer Evangelist

Keshia Rose Articles

Keshia Rose's Articles

The Comprehensive Guide to Preventing Digital Payment BIN Attacks
February 14, 2024

The Comprehensive Guide to Preventing Digital Payment BIN Attacks

Explore how Bank Identification Number (BIN) attacks work, their risks, and prevention strategies in digital payments.

How to Approach Assessing Trust in Peer-to-Peer (P2P) Lending Platforms
January 31, 2024

Assessing trust in peer-to-peer lending platforms

Understand how browser-based signals enhance trust assessments in peer-to-peer lending for improved platform security.

What is Bot-Driven Wire Transfer Fraud? How It Works and How to Prevent It
January 18, 2024

Bot-driven wire transfer fraud: How it works and prevention

Dive into bot-driven wire transfer fraud, exploring phishing, account takeovers, and prevention strategies.

What is a DDoS attack? Understanding and Preventing Distributed Denial-of-Service Attacks
December 20, 2023

What is a DDoS attack? Understanding and prevention

Explore the nature of DDoS attacks, their impacts, and mitigation strategies in our detailed guide on online security.

Open Banking What it is, Its Benefits, Its Risk of Fraudulent Account Linking and How to Prevent It
December 14, 2023

Open Banking: Benefits, fraud risks, and prevention

Understand open banking, its differences from traditional banking, benefits, risks, and fraud prevention measures.

Product Update: Deep Dive into Your Fingerprint Data with Bulk CSV Export
December 12, 2023

Product update: Analyze Fingerprint data with bulk CSV export

Introducing Bulk CSV Export from Fingerprint, streamlining data analysis for enhanced security and decision-making.

How Paywalls Work, How Paywall Evasion Happens, and How to Implement Paywall Protection
December 12, 2023

How to Implement a Paywall

Dive into paywall protection challenges and strategies for managing anonymous access on content sites.

Social Engineering Keyboard
December 8, 2023

Social engineering: The guide to preventing attacks

Learn what social engineering is, technical solutions for detection, and preventive strategies with our comprehensive guide.

Navigating the Risks of User-Initiated App Cloning
December 5, 2023

Navigating the Risks of User-Initiated App Cloning

Mitigate risks with strategies for detecting and dealing with user-initiated app cloning and its impact on business security.

Enhancing Visitor Detection with Fingerprint’s Akamai Proxy Integration
November 21, 2023

Enhance visitor detection with Fingerprint's Akamai proxy integration

Learn to set up Fingerprint’s Akamai Proxy Integration for precise device recognition and improved visitor identification.

Announcing our Akamai Proxy Integration
November 13, 2023

Announcing our Akamai Proxy Integration

Discover the new Akamai proxy integration by Fingerprint, enhancing visitor identification and fraud prevention.

Optimizing Identification Reliability with Fingerprint's AWS CloudFront Proxy Integration
November 2, 2023

Optimize identification reliability with AWS CloudFront proxy integration

Boost your visitor identification accuracy despite ad-blockers and privacy settings with Fingerprint's AWS CloudFront Proxy Integration.