SlideShare a Scribd company logo
1 of 19
Download to read offline
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission
使用实时全球分析增加收入和减少欺诈
Ken Lam
Marketing Director, Asia Pacific
ThreatMetrix
May 2017
认证数字身份很困难
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without ThreatMetrix Express Written Permission 2
Open Account Make PaymentLogin
No single organizational view of Digital
Identity and decision strategy
Abandonment AuthenticationFriction
Multiple devices,
Personas and locations
User
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission 3
数身份攻击是全球化,自动化和增长中
Daily Rejected Transactions
Identity
Abuse Index
高达95%的交易是欺诈性的
% fraudulent account login attempts for ecommerce
2016年:在数字式边界的一年
Over one billion BOT
driven identity
testing attacks
stopped
1 in 5 Transactions
Cross Boarder
Native Mobile
Transactions surpassed
Mobile Web
43% Transactions Mobile
(53% Financial Services)
15 B Transactions
representing
$600B+ in value
350M Fraud
attacks detected
saving ~$15B in
losses
我们需要一种新的方法来认证数字身份
Real-time Big Data Analytics
ThreatMetrix
维护着一个无
与伦比的数字
身份网络。
理解 人与关联
设备,位置,
凭据和威胁行
为之间的关系...
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission 7
...和现在和随着
时间的多个角色
之间更复杂的关
系。
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission 8
4.5 billion connected
devices
1.5 billion+ mobile
devices
2 billion transactions
per month
200+ countries and
territories covered
750 million unique
email addresses
700 million IP
addresses
643 million physical
mail addresses
1.4 billion unique
online accounts
500 Million+ attacks
stopped annually
数字身份网络
• 15亿数字身份代表全球所有活
跃数字消费者的40%
• 超过95%的识别率
可信用户或网络威胁?
Airline
17
Identities
Marketplace
2 Accounts
Bank
6 Accounts
PartnersFinancial ServiceseCommerce
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission
12
ThreatMetrix分析超过超过4000个客户的30K网站7500万的每日交易
DEVICE
IDENTITY
LOCATION
THREAT
数字身份智能 动态决策平台
SMART
ANALYTICS
INTEGRATION
HUB
DECISION
MANAGEMENT
MACHINE	
LEARNING
Smart
Learning
Smart Rules
智能分析
Adaptive	Dynamic
per-Entity	Variables	
Parameter	Selection,	
Weighting	&	Normalization
200ms
BEHAVIORAL	ANALYTICS MACHINE	LEARNING
ThreatMetrix搜索和分析
1
实时位置分析
1
ThreatMetrix在行动:
Cookie
Wiping
Session
Replay
Rotating IP
Address
Situation: 7 Hours (0800
hours to 1500 hours) of
high volume new
account origination
attacks using multiple
methods
Result: 1200 attacks
stopped
顾客见证
18
By using Digital
Identities we can
provide a more
streamlined
authorization
process,
improving overall
card usage while
reducing fraud.”
The ThreatMetrix
Portal, in terms of
case reviews,
recalls and the
flexibility of the
rules, is excellent.
I think it is quite
unique for a
company the size
of Netflix to be
able to rely on a
single fraud and
security solution
like this.”
ThreatMetrix
allowed us to
have bespoke,
risk-based
authentication
that is ahead of
the curve.”
Fraud	
Prevention
Threat
Detection
Authentication
Customer
Identity
“““ “
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission
Thank You
ThreatMetrix Confidential Information – Do Not Copy or Distribute Without Express Written Permission19

More Related Content

What's hot

The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
Bp Corp Pres Short
Bp Corp Pres ShortBp Corp Pres Short
Bp Corp Pres Shortkevinjoy
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachLaurent Pacalin
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
Falcon debit credit_2909_ps
Falcon debit credit_2909_psFalcon debit credit_2909_ps
Falcon debit credit_2909_pskazemita
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021Bruce Ma
 

What's hot (12)

Requirement of PCI DSS in India.
Requirement of PCI DSS in India.Requirement of PCI DSS in India.
Requirement of PCI DSS in India.
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Bp Corp Pres Short
Bp Corp Pres ShortBp Corp Pres Short
Bp Corp Pres Short
 
MTBiz May-June 2019
MTBiz May-June 2019 MTBiz May-June 2019
MTBiz May-June 2019
 
Preventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel ApproachPreventing Fraud with a Multi-Channel Approach
Preventing Fraud with a Multi-Channel Approach
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Falcon debit credit_2909_ps
Falcon debit credit_2909_psFalcon debit credit_2909_ps
Falcon debit credit_2909_ps
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
 

Similar to ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without Customer Friction

Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsCXO 2.0 Conference
 
Cyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeCyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeNeil Kemp
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfA Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfIDMERIT IDMERIT
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety
 
Naapi – Insurer Innovation Award 2023
Naapi – Insurer Innovation Award 2023Naapi – Insurer Innovation Award 2023
Naapi – Insurer Innovation Award 2023The Digital Insurer
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdfMerchantech - Payment Processing Services
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudMichael Holden
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Financial Management Cybersecurity Protecting Your Financial Data.pdf
Financial Management Cybersecurity Protecting Your Financial Data.pdfFinancial Management Cybersecurity Protecting Your Financial Data.pdf
Financial Management Cybersecurity Protecting Your Financial Data.pdfJose thomas
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!Caroline Johnson
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowDigiliti Money
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutionsRasool Irfan
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 

Similar to ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without Customer Friction (20)

Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
Cyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeCyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid Cybercrime
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdfA Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
A Comprehensive Guide of KYC in Crypto Exchanges in 2023.pdf
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Naapi – Insurer Innovation Award 2023
Naapi – Insurer Innovation Award 2023Naapi – Insurer Innovation Award 2023
Naapi – Insurer Innovation Award 2023
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Financial Management Cybersecurity Protecting Your Financial Data.pdf
Financial Management Cybersecurity Protecting Your Financial Data.pdfFinancial Management Cybersecurity Protecting Your Financial Data.pdf
Financial Management Cybersecurity Protecting Your Financial Data.pdf
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
 
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and TomorrowRisky Business: Detecting RDC Deposit Fraud Today and Tomorrow
Risky Business: Detecting RDC Deposit Fraud Today and Tomorrow
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 

More from Ken Lam

高い不正検知とユーザーの利便性維持の 両立
高い不正検知とユーザーの利便性維持の 両立高い不正検知とユーザーの利便性維持の 両立
高い不正検知とユーザーの利便性維持の 両立Ken Lam
 
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援Ken Lam
 
Netfilxの無料トライアル不正行為対策を サポート
Netfilxの無料トライアル不正行為対策を サポート Netfilxの無料トライアル不正行為対策を サポート
Netfilxの無料トライアル不正行為対策を サポート Ken Lam
 
Fit forum seminar_20170623
Fit forum seminar_20170623Fit forum seminar_20170623
Fit forum seminar_20170623Ken Lam
 
Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報Ken Lam
 
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为Ken Lam
 
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートKen Lam
 
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートKen Lam
 
ThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティKen Lam
 

More from Ken Lam (9)

高い不正検知とユーザーの利便性維持の 両立
高い不正検知とユーザーの利便性維持の 両立高い不正検知とユーザーの利便性維持の 両立
高い不正検知とユーザーの利便性維持の 両立
 
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
ThreatMetrix・グローバル・共有インテリジェンス によるVISA顧客認証サービス(VCAS)の強化支援
 
Netfilxの無料トライアル不正行為対策を サポート
Netfilxの無料トライアル不正行為対策を サポート Netfilxの無料トライアル不正行為対策を サポート
Netfilxの無料トライアル不正行為対策を サポート
 
Fit forum seminar_20170623
Fit forum seminar_20170623Fit forum seminar_20170623
Fit forum seminar_20170623
 
Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報Threat metrix全球共享数字身份情報
Threat metrix全球共享数字身份情報
 
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
ThreatMetrix 协助平安银行的手机应用程序带来新的用户体 验,减少了与用户之间的摩擦和欺诈行为
 
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix rスレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
 
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポートThreatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
Threatmetrix スレットメトリックス・グローバル共有インテリジェンスによる VISA 顧客認証サービス(VCAS)のサポート
 
ThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティThreatMetrix のデジタル・ アイデンティティ
ThreatMetrix のデジタル・ アイデンティティ
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without Customer Friction