To Catch a Fraudster is a podcast for eCommerce merchants and enterprise security professionals who dream of vengeance on the thieves, hackers, and con artists stealing their revenue and customer data. Merchant Fraud Journal interviews the entrepreneurs, fraud experts, and corporate leaders on the front lines of the war against fraud. Join us to hear their real-world stories about the weird, the bold, and the infuriating of fraudster attacks. Learn from the mistakes of others and implement the tactics, strategies, and technologies you need to secure your store or protect your corporate systems from attack.
All content for To Catch a Fraudster is the property of Merchant Fraud Journal and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
To Catch a Fraudster is a podcast for eCommerce merchants and enterprise security professionals who dream of vengeance on the thieves, hackers, and con artists stealing their revenue and customer data. Merchant Fraud Journal interviews the entrepreneurs, fraud experts, and corporate leaders on the front lines of the war against fraud. Join us to hear their real-world stories about the weird, the bold, and the infuriating of fraudster attacks. Learn from the mistakes of others and implement the tactics, strategies, and technologies you need to secure your store or protect your corporate systems from attack.
Ari Jacoby, CEO of Deduce, discusses the use of generative AI by fraudsters.
To Catch a Fraudster
To Catch a Fraudster is a podcast for eCommerce merchants and enterprise security professionals who dream of vengeance on the thieves, hackers, and con artists stealing their revenue and customer data. Merchant Fraud Journal interviews the entrepreneurs, fraud experts, and corporate leaders on the front lines of the war against fraud. Join us to hear their real-world stories about the weird, the bold, and the infuriating of fraudster attacks. Learn from the mistakes of others and implement the tactics, strategies, and technologies you need to secure your store or protect your corporate systems from attack.