Keshia Rose photo

Keshia Rose

Role

Senior Developer Evangelist

Keshia Rose Articles

Keshia Rose's Articles

Security lessons learned from the Snowflake data breach
June 17, 2024

Security lessons learned from the Snowflake data breach

The Snowflake data breach exposed critical vulnerabilities. Learn how to enhance your business’ security measures without sacrificing user experience.

Canvas fingerprinting
May 8, 2024

Canvas fingerprinting: What it is and how it works

Learn how canvas fingerprinting works, its business applications, and how to generate unique identifiers using HTML5 Canvas.

Browser Spoofing: What it is and how to detect it
March 8, 2024

Browser Spoofing: What it is and how to detect it

Learn about browser tampering, its impact on security, user-driven changes to fingerprints, and advanced detection methods.

Privacy-Focused Browser Settings: What Businesses Need To Know
February 27, 2024

Privacy-Focused Browser Settings: What Businesses Need To Know

Learn about privacy-focused settings in fraud risk assessment and how these settings impact browser detection.

Social Engineering Keyboard
December 8, 2023

Social engineering: The guide to preventing attacks

Learn what social engineering is, technical solutions for detection, and preventive strategies with our comprehensive guide.

Enhancing Visitor Detection with Fingerprint’s Akamai Proxy Integration
November 21, 2023

Enhance visitor detection with Fingerprint's Akamai proxy integration

Learn to set up Fingerprint’s Akamai Proxy Integration for precise device recognition and improved visitor identification.

Optimizing Identification Reliability with Fingerprint's AWS CloudFront Proxy Integration
November 2, 2023

Optimize identification reliability with AWS CloudFront proxy integration

Boost your visitor identification accuracy despite ad-blockers and privacy settings with Fingerprint's AWS CloudFront Proxy Integration.

  • Fingerprinting
How to Provide Personalization to Anonymous Users
October 27, 2023

How to Provide Personalization to Anonymous Users

The majority of visitors to your website are anonymous. Discover ways to personalize their experience without needing them to sign in.

The Limits of JA3 - What it is, why it's not enough for accurate device identification
October 26, 2023

The limits of JA3: Why it’s not enough for accurate device identification

Discover JA3 fingerprinting, its uses in device identification, its limitations, and what's needed for robust identification.

How to Prevent Coupon and Promo Abuse and Increase Repeat Sales
October 25, 2023

How to Prevent Coupon and Promo Abuse

Learn strategies to mitigate coupon and promo abuse to safeguard your profit margins and enhance customer experiences.

Maximizing Identification Accuracy with Fingerprint’s Cloudflare Proxy Integration
October 23, 2023

Maximize identification accuracy with Cloudflare proxy integration

Learn how Fingerprint Pro’s Cloudflare Proxy Integration aids in accurate device identification despite privacy policies.

How to Increase Revenue by Identifying & Preventing Account Sharing
October 18, 2023

Account Sharing: The Step-By-Step Prevention Guide

Address account sharing impacts with our tutorial on detection techniques and converting users into paying customers.