[fusion_builder_container background_color=”#fff” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”70px” padding_bottom=”40px” padding_left=”10%” padding_right=”10%” hundred_percent=”yes” equal_height_columns=”yes” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“As mobile apps rely more and more on in-app “virtual” purchases, they must also be ready to fight fraud….”
[/fusion_title][fusion_separator style_type=”none” top_margin=”50px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://techcrunch.com/2016/01/20/virtual-goods-real-fraud/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”#ffffff” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“If you are a consumer-facing web or mobile app, you are up against a much more numerous and advanced adversary than ever before…”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.scmagazine.com/on-deck-predictions-for-2016-and-beyond/article/458529/4/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”#ffffff” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“DataVisor has released its Top 5 online fraud predictions for 2016, and it’s expecting escalating threats from social sites, digital wallets… “[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.infosecurity-magazine.com/news/social-digital-wallets-uber-and/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”#ffffff” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”70px” padding_bottom=”40px” padding_left=”10%” padding_right=”10%” hundred_percent=”yes” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”#ffffff” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“The industry needs to change to more advanced solutions that can distinguish malicious traffic emitted from cloud infrastructure precisely…”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://siliconangle.com/blog/2015/11/18/first-look-big-data-security-firm-datavisor-predicts-top-5-online-fraud-targets-for-2016/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”#ffffff” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“Legacy security systems find it difficult to keep up with the volume of various transactions on major shopping days such as Singles Day…”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.ecommercetimes.com/story/82745.html” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”#ffffff” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“DataVisor has a unique security algorithm that operates within a Spark big data platform that is able to process billions of events per hour …”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://letstalkpayments.com/exclusive-interview-with-yinglian-xie-ceo-of-datavisor-on-fraud-trends-and-sleeper-cells/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”#fff” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”70px” padding_bottom=”40px” padding_left=”10%” padding_right=”10%” hundred_percent=”yes” equal_height_columns=”yes” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“As security researchers, we have seen an increasing trend of online attacks. There are a lot of common challenges faced by different types of …”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”https://innovators.berkeley.edu/article/fang-yu-%E2%80%9906-building-big-data-security-startup-woman-founder” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“Well-organized attack campaigns have armies of ‘sleeper cells’ that look and behave like benign accounts, only to wake up all at once…”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.pymnts.com/news/2015/datavisor-scoops-up-14-5m-to-push-big-data-security/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“Legacy security solutions are no longer effective at detecting these modern adversaries that have developed an array of evasion techniques…”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://insidebigdata.com/2015/10/13/datavisor-secures-14-5m-funding-round-for-utilizing-big-data-analytics-for-internet-security/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”#ffffff” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”70px” padding_bottom=”40px” padding_left=”10%” padding_right=”10%” hundred_percent=”yes” equal_height_columns=”yes” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”none” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]The idea is to keep companies ahead of sophisticated attackers, who can test out and incubate attacks before launching them in order to maximize impact.
[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://venturebeat.com/2015/10/13/big-data-security-startup-datavisor-takes-on-14-5m/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”100px” margin_bottom=”” class=”” id=””]“The problem for the botmakers is that mimicking the behavior of mobile users is more difficult, says Fang Yu, the cofounder of security startup Datavisor…”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://fusion.net/story/205786/jailbroken-iphones-spam-bots-taobao/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”none” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“Attackers are using “helper” tools to register millions of fake social media accounts, with the result that around 10 percent of all social media accounts are…”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.fierceitsecurity.com/story/attackers-use-helper-tools-register-millions-fake-social-media-accounts-war/2015-09-29″ color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”#ffffff” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”70px” padding_bottom=”40px” padding_left=”10%” padding_right=”10%” hundred_percent=”yes” equal_height_columns=”yes” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“What makes ATO attacks so dangerous is that they target accounts that are created by real users.”
[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.darkreading.com/endpoint/anatomy-of-an-account-takeover-attack/a/d-id/1324409″ color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]DataVisor CTO Fang Yu on using Spark and unsupervised analytics to fight online fraud.[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://radar.oreilly.com/2016/02/using-apache-spark-to-predict-attack-vectors-among-billions-of-users-and-trillions-of-events.html” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]“We are able to detect and correlate activity so attacks orchestrated by the same attackers are grouped together.”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.eweek.com/security/datavisor-debuts-user-analytics-for-security.html” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”#ffffff” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”70px” padding_bottom=”40px” padding_left=”10%” padding_right=”10%” hundred_percent=”yes” equal_height_columns=”yes” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”100px” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”none” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”100px” margin_bottom=”90px” class=”” id=””]“The first solution that leverages unsupervised analytics to detect online fraud campaigns at incubation stages…”
[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.networkworld.com/article/3040993/data-center/new-products-of-the-week-3-7-16.html#slide4″ color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”” padding=”” margin_top=”” margin_bottom=”” animation_type=”” animation_direction=”” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”50px” margin_bottom=”60px” class=”” id=””]“DataVisor’s big data analytics, discovers new, unknown attacks in the wild without relying on any prior knowledge of attacks.” [/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://mobilemarketingwatch.com/datavisor-aims-to-revolutionize-fraud-detection-in-the-mobile-age-65665/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”100px” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”100px” margin_bottom=”50px” class=”” id=””]“DataVisor … is able to identify subtle patterns that indicate malicious accounts that have not yet begun an attack.”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://cardnotpresent.com/news/default.aspx?id=14035″ color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”#ffffff” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”70px” padding_bottom=”40px” padding_left=”10%” padding_right=”10%” hundred_percent=”yes” equal_height_columns=”yes” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”100px” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”120px” margin_bottom=”60px” class=”” id=””]“IGG provides the data it gets back from DataVisor to its ad network partners so they can use it as ammunition to turf out shady publishers if they so choose”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://adexchanger.com/mobile/game-publisher-igg-fights-app-install-fraud-analytics/” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”100px” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”100px” margin_bottom=”90px” class=”” id=””]“The average fraud rate per ad campaign is around 5-20 percent, while in some extreme cases over half or all of the acquired installs are entirely fraudulent.”
[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://mobileadvertisingwatch.com/are-you-paying-for-fake-app-installs-22883″ color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”100px” margin_bottom=”0″ animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”125px” margin_bottom=”50px” class=”” id=””]“The demand for user accounts, coupled with the relative ease of creating them, have created a large underground market for fake accounts, fake followers, and fake likes.”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://nymag.com/selectall/2016/05/does-the-like-mean-anything-anymore.html” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container background_color=”#ffffff” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”solid” padding_top=”70px” padding_bottom=”40px” padding_left=”10%” padding_right=”10%” hundred_percent=”yes” equal_height_columns=”yes” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_builder_row][fusion_builder_column type=”1_3″ last=”no” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”100px” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”120px” margin_bottom=”60px” class=”” id=””]“As the security landscape continues to evolve with new technology, online services also need to be aware of these new threats and be prepared to deal with them.”[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.mobilemarketer.com/cms/opinion/columns/23140.html” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][fusion_builder_column type=”1_3″ last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”100px” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][fusion_imageframe lightbox=”no” gallery_id=”” lightbox_image=”” style_type=”none” hover_type=”none” bordercolor=”” bordersize=”0px” borderradius=”0″ stylecolor=”” align=”center” link=”” linktarget=”_self” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” hide_on_mobile=”no” class=”” id=””] [/fusion_imageframe][fusion_title size=”4″ content_align=”center” style_type=”none” sep_color=”” margin_top=”100px” margin_bottom=”90px” class=”” id=””]Women in Business Q&A: Yinglian Xie and Fang Yu, Co-Founders, DataVisor
[/fusion_title][fusion_separator style_type=”none” top_margin=”15px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””/][fusion_button link=”http://www.huffingtonpost.com/laura-dunn/women-in-business-qa-ying_b_10936972.html” color=”default” size=”” stretch=”” type=”” shape=”” target=”_self” title=”” gradient_colors=”|” gradient_hover_colors=”|” accent_color=”” accent_hover_color=”” bevel_color=”” border_width=”” icon=”” icon_position=”left” icon_divider=”no” modal=”” animation_type=”0″ animation_direction=”left” animation_speed=”1″ animation_offset=”” alignment=”center” class=”” id=””]Read More[/fusion_button][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]