Adam Tyler

About Adam Tyler

Adam leads the charge promoting innovation in technology at CSID, now a part of Experian Partner Solutions. His expertise spans far across the security landscape, including identity protection and fraud detection, cyber security trends, hacking and attack methods. Adam is passionate about teaching companies and consumers how to take control of their information and privacy. Adam is based out of the UK and is an internationally known speaker on matters of cyber security, identity theft, fraud detection and identity protection.

The Latest in PII Values on the Dark Web

By | April 17th, 2017|The Dark Web|

Every day, cyber criminals of varying skill levels and capabilities buy and sell stolen consumer and business credentials on the dark web. While once perceived to be an inaccessible, mysterious place, the dark web of today is very much within reach. Less technical, younger individuals can access the dark web and participate in underground commerce [...]

2017: The Evolution of the Password, IoT Threats and Other Predictions

By | December 27th, 2016|Online Safety|

For both consumers and businesses, 2016 was a big year for cybersecurity. As we predicted at the beginning of the year, large-scale breaches continued to dominate the headlines and the Internet of Things (IoT) became a growing source of security concerns. But as the year comes to a close, it’s time to look to the [...]

Virtual Reality: Real-World Security Concerns

By | December 1st, 2016|Industry News|

Recent advancements in virtual reality (VR) have ushered in one of the most exciting times in technology, with consumers and businesses alike realizing VR’s potential for transforming and enhancing experiences. VR has proven to be so much more than a vehicle for gaming. We’re still in the early stages of understanding the full implications of [...]

The Hollywoodization of the Hacker: Lessons From Mr. Robot

By | November 10th, 2016|Online Safety|

Current shows like Silicon Valley and Mr. Robot and movies like Blackhat have brought hackers into the ranks of pop culture’s most popular protagonists. Until recently, hackers in movies have largely been represented as zany sidekicks or mysterious recluses. But now hackers, and especially vigilante white-hat hackers, are being portrayed like real life, albeit unlikely, [...]

Macs Under Attack: Why We Can’t Take Security for Granted

By | September 1st, 2016|Industry News|

In January, we shared predictions about the trends that would dominate the cybersecurity space in 2016. Among those was a prediction that Apple devices would no longer be “immune” to attack and as they gained popularity, would become a more desirable target than ever for cyber criminals. Once seemingly impossible to penetrate, we’re already seeing [...]

Here’s the Going Rate for Your Accounts on the Dark Web

By | August 4th, 2016|The Dark Web|

Last year, I took the stage at South by Southwest and walked audience members through a live demonstration of dark web marketplaces in a session called “Digital Identities: Modern Underground Currencies.” We kicked off with a game of “Price (of Pii) is Right,” where I gave the audience an opportunity to guess how much personally [...]

National Internet Safety Month: Gaming and Hacking

By | June 10th, 2016|Online Safety|

June is National Internet Safety Month, which began in 2005 in order to raise awareness around the need for online safety, especially among children and teens. In honor of Internet Safety Month, let’s hone in on the gaming industry, one area in particular that has caused a huge growth in the popularity of hacking. More [...]

2016: Mobile, IoT Threats on the Horizon

By | December 21st, 2015|Industry News|

Last week we recapped the big happenings of 2015 for Experian. This week, we’re switching gears to look ahead to 2016 and the trends we expect to dominate in the year to come. All eyes on mobile The rise of mobile payments (and recent participation from major players like Apple, Android and financial institutions like [...]

Ransomware in Review

By | November 24th, 2015|Business Security, Malware and Scams|

One of the scariest cyber security trends of 2015 was the evolution and uptick of ransomware attacks. Ransomware is a type of malware that, once installed on user’s device, will block access to the device until a ransom is paid to the cyber criminal to unlock and remove the malware. The FBI recently reported that [...]

Securing All the Things: IoT Myths and Realities

By | September 4th, 2015|Uncategorized|

The Internet of Things isn’t a new concept – but it’s certainly one that has gained momentum, particularly within the last year. Recently, we’ve seen more and more connected devices come to market. While connecting our world may bring added convenience to our everyday lives, it’s important to question what we may be sacrificing from [...]

Load More Posts