27.Why fraudsters copy your platform
26.Self-hosted HIPAA monitoring
25.Field audit trails and compliance monitoring
24.Threat hunting in your own app
23.See what your API endpoints show to the world
22.When your platform becomes the laundering machine
21.Detecting click fraud self-hosted
20.Chargeback fraud starts before the dispute
19.Bonus abuse and multi-accounting
18.Application-level security for insider threats
17.Open-source bot monitoring and mitigation
16.Monitoring non-human identities by default
15.Detecting VPNs and proxies is not enough
14.Catching fake registrations at the door
13.Open-source account takeover detection
12.Digital footprints
11.Embedding fraud scoring
10.User activity monitoring on-premises
09.Detecting click fraud with only 1px
08.Platform security is not what you think it is
07.Brief look at mission-critical applications
06.Understanding Apple Private Relay blocking
05.Front-end minimum requirements
04.The hidden threats of residential IPs
03.Faces behind a thousand masks
02.tirreno code discipline
01.Foreword