Everyone saw the Colonial Pipeline attack in the news media, and ever since ransomware has become a household word. Most people understand that ransomware involves black hats putting code on people’s computers that, once triggered, causes them to lock up, and some people even know that encryption is involved, but...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Many organizations face an upward battle when detecting and preventing fraud.
Consumers continue to migrate to digital channels and while organizations are
benefiting from this transition, it comes at a price. Where transactions occur, fraudsters follow, seeking out new vulnerabilities to exploit.
In this webinar,...
By baselining cyber maturity, one can create an organization's risk profile - and that is the key to being able to build a road map for prioritizing and addressing business risk. ISACA's Brian Fletcher shares insights on establishing the maturity goals for one's unique organization.
"Shadow data" - it's the new "shadow IT," and it puts your enterprise data at potential risk in public cloud environments. Amit Shaked, CEO and co-founder of Laminar, defines the risk, explains the threat and describes how best to mitigate it.
Email is the number one threat vector for ransomware. But the solution to ransomware is not simply blocking malware in an attachment. Attackers have pivoted to using email as the first step to gain access, which will ultimately allow them to deploy their ransomware or broker the access to someone who will.
Join...
The accelerated consumption of digitized services has not only changed the banking landscape - it has affected anti-money laundering risks and defenses. David Stewart and Paul Franks of SAS weigh in on emerging risks, defenses and shifts in the AML compliance landscape.
Two recent hacking breaches affecting hundreds of thousands of individuals - one reported by a firm that provides services to health plans and the other by a government contractor - serve as the latest reminders of the risks involving vendors that handle sensitive personal data.
SecurityScorecard provides analysis of organizational cyber hygiene through a rating system, while LIFARS, a digital forensics firm, has offered witness testimony for major federal cybercrime cases involving nation-state threat actors. CEOs for both firms tell ISMG why their merger is significant.
This report is based on a survey of security professionals that covers the state of
security automation. Findings include the revelations that incident response teams
remain relatively small and tend to handle a sizable share of incident response
processes in-house.
Automation is taking place, but it appears to...
With the rapid changing threat landscape, protecting your enterprise from breaches and account takeover fraud has never been a bigger challenge.
Retail and merchant fraud teams have the challenges of understanding customer identities and human behaviors regardless of how many devices, accounts, profiles, and...
Understanding customer identities in the digital world is no easy feat: In the US, the average household has 10+ connected devices, and the average adult has 4 credit cards and over 100 online accounts.
Fraud teams must cut through the clutter to single out good and bad users, regardless of how many devices,...
Organizations today need to rethink how cloud security not only drives stronger predictions, but adds value with ease of use. Learn how you can stop the most evasive attacks automatically with adaptive security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.