Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:08 PM
Dark Reading
Dark Reading
Products and Releases

41st Parameter Expands European Operations

Also appoints information security veteran David Curran as vice president of its EMEA region

SCOTTSDALE, Ariz. and MUNICH, Feb. 11 /PRNewswire/ -- 41st Parameter, the leading provider of web fraud detection and prevention solutions, today announced the expansion of its European presence with the opening of a new office in Munich, Germany. The company simultaneously announced the appointment of information security veteran David Curran as vice president of its EMEA region with overall responsibility for sales, marketing and customer support. The announcement underscores the success of 41st Parameter's original sales office based in London. With the addition of the new Munich facility the company is now positioned to address the escalating demand for its online fraud detection and intervention solutions throughout Europe and the Middle East.

41st Parameter protects brand integrity while defending bottom line revenue for some of the best-known companies doing business on the Internet including global financial services institutions, international airlines, and cross-border online merchants. The company's portfolio of cross-channel solutions have proven uniquely effective at detecting fraud ring activity and stopping multiple forms of online theft including card not present fraud, new account opening fraud, phishing and account takeover and bust-outs.

As vice president, EMEA for 41st Parameter, David Curran will leverage more than twenty years of pan-European experience starting and growing high-velocity sales and channel operations for venture backed software companies. During his career he has established and developed EMEA sales organizations for six software companies with two achieving successful initial public offerings and two others strategic acquisitions. Most recently Curran served as vice president of International sales at information security solution provider Ounce Labs which was acquired by IBM in June 2009.

"With strong operations in North America and the UK, and a growing multi-national customer base, we're aggressively expanding our footprint with the establishment of the Munich office," said Pete Selda, 41st Parameter's chief executive officer. "We're pleased to have David Curran lead our international expansion and bring our proven solutions and exceptional customer service to the wider EMEA region."

"Online fraud is a growing concern throughout the region," said David Curran, newly appointed vice president, EMEA. "This is an exciting opportunity to bring 41st Parameter's critical solutions to the broader European and Middle East markets, defending online businesses against an ever-growing fraud risk.

The new office is located at Terminalstrasse Mitte 18, 85356 Munich, Germany.

About 41st Parameter

41st Parameter provides solutions for detecting and preventing fraud across multiple channels for the world's most valued and recognizable brands. Leading financial institutions, e-commerce companies, and travel services businesses rely on 41st Parameter's technology to protect them from cybercrime threats including card not present fraud, new account origination fraud, phishing and account compromise, credit bust outs, and fraud ring attacks. Founded in 2004, 41st Parameter makes the process of detecting and preventing fraud easier and more effective, reducing both expenses and potential losses. As a leading web fraud detection innovator the company supplies industry-proven solutions which integrate advanced device identification with comprehensive risk management capabilities. To learn more about 41st Parameter, visit www.the41st.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...