• Join us at ISS World Middle East 2022

    Cognyte is headed to Dubai to meet with law enforcement homeland security professionals, security analysts, investigators, cyber-crime pros, and more at the world’s largest law enforcement and public safety gathering. We are excited to meet in person with the security community to exchange ideas, share best practices, and discuss the latest developments in security analytics….

    By Cognyte
    Feb 28 2022 · 2 Min Read
  • IBM sells i2: what’s next for your analytics platform?

    IBM’s sale of i2 to Harris makes the security community rethink what they need in an investigative analytics platform The world of security analytics is a buzz concerning the recent sale of IBM’s i2 portfolio to Harris Computer. Users have become speculative as to potential shifts and the uncertainty of the solution’s roadmap and ongoing support. Savvy organizations are using this as an opportunity to evaluate what they need in…

    By Cognyte
    Jan 12 2022 · 3 Min Read
  • 5 Kinds of Cryptocurrency Crime

    Technology has made almost every aspect of our lives – and the lives of criminals – easier. The blockchain has fostered an ecosystem in which illicit actors can easily operate anonymously and internationally, stalling financial investigations and setting the stage for increased crypto crime. In our previous blog we outlined how criminal actors exploit the…

    By Tom Sadon, Director of Product Marketing
    Nov 09 2021 · 6 Min Read
  • Are Telecoms the Most Popular Target of Cyber-Attacks in 2021?

    Recent headlines have focused on data breaches of social media platforms, but the frequency and impact of these attacks pale in comparison to those in cyber-criminals’ favorite industry: telecommunications. Cyber-attacks on telecoms are popular because their databases carry detailed information on millions of customers. A successful telecom data breach could yield contact details, social security…

    By Cognyte CTI Research Group
    Nov 09 2021 · 3 Min Read
  • Cryptocurrency money laundering

    Money Laundering: The Key to Cryptocurrency Crime

    Money laundering is a common theme among many crypto crimes. Criminal actors exploit the anonymity of the blockchain to launder gains from both off-chain and on-chain crimes to obfuscate the sources of illicit funds and convert them into cash for bank deposits. Cryptocurrency is used by criminals to launder funds from diverse types of crimes,…

    By Tom Sadon, Director of Product Marketing
    Nov 07 2021 · 6 Min Read
  • Keeping up With Financial Investigations in the Crypto Age

    The strategies of criminals and terrorists are constantly evolving, employing new techniques and technologies to commit crimes and stay one step ahead of law enforcement and security organizations. The blockchain has presented a valuable opportunity for dark actors to make countless types of anonymous cryptocurrency transactions, ranging from drug trafficking to money laundering to terror…

    By Tom Sadon, Director of Product Marketing
    Nov 03 2021 · 4 Min Read
  • 5 Reasons Why Criminals & Terrorists Turn to Cryptocurrencies

    In this blog, Cognyte presents the appeal of cryptocurrency to criminals and terrorists, outlines the challenges facing security and law enforcement, and explains how Cognyte’s solution can help overcome these challenges and track down those behind illicit crypto transactions.

    By Tom Sadon, Director of Product Marketing
    Nov 02 2021 · 7 Min Read
  • 2021 Milipol Innovation Awards2

    Cognyte’s Blockchain Analytics Solution Wins the 2021 Milipol Innovation Awards

    Cognyte is honored and humbled to announce that its revolutionary blockchain analytics solution has been selected as a winner of the 2021 Milipol Innovation Awards. The contest took place as part of the Milipol Paris event, a leading event for security that hosts a global audience of tens of thousands of members of the security…

    By Tom Sadon, Director of Product Marketing
    Oct 26 2021 · 4 Min Read
  • 2021 LinkedIn breach: cybercriminals are the new headhunters

    The fact that multiple databases of stolen records are shared for free on Dark Web platforms is not new. Stolen data can be used for various types of attacks, including spear-phishing, random malspam campaigns, etc. But a new, concerning data breach trend is emerging. Across Dark Web forums, services offer large-scale data filtered by categories,…

    By Cognyte CTI Research Group
    Oct 21 2021 · 4 Min Read
  • security operations center 2

    Information & attention – a balancing act for improved SOC intelligence

    Teams in Security Operations Centers (SOC) increasingly need to balance their attention across vast amounts of information from multiple sources. But while the challenges of situational intelligence and effective incident management and response are becoming more complex, they are certainly not new. Herbert A. Simon had observed the simple but intrinsic connection between information and…

    By Tzvika Zaiffer, Solutions Marketing Manager, Situational Intelligence Solutions
    Oct 14 2021 · 5 Min Read
2 / 4