Federal regulators are considering potential changes to HIPAA privacy rule and enforcement regulations, but aim to first engage the healthcare sector and public for input, says the nation's top HIPAA enforcer. So, what changes are being considered?
As account opening continues to transition from physical to digital channels, financial institutions and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise thanks to some of the same digital channel benefits enjoyed by consumers:...
As banking institutions of all sizes maximize their digital channels, there is growing tension between the need to prevent fraud and the desire to maintain a frictionless customer experience. IBM Trusteer's Valerie Bradford discusses how to defuse this tension.
Authentication innovation is still in its infancy, and most companies are still combining more traditional passwords and PINs with cutting edge
biometrics or contextual decisioning methods. The combination brings new capabilities to multi-factor authentication, but doesn't necessarily produce the best possible...
The digital shift is increasing the need for more sophisticated privacy and data protection measures. Several major institutions have seen their information security compromised in recent years as cyberattacks and fraudulent activity show no sign of slowing down. With PSD2 regulations now in effect, companies are in...
The financial industry continues to be a high-risk target for fraud, primarily fueled by the sale of stolen credentials, account numbers, pins, and personal and financial information.
While larger financial institutions have dedicated in-house teams and sophisticated technologies in place to detect incidents,...
True "next-generation" multi-factor authentication (MFA) platforms should be well equipped to manage the customer experience while providing the right level of security assurance at the right time, anytime.
Download this e-book and learn ten criteria to look for in a robust MFA platform, including:
Decentralized,...
Whether it's insider or third-party vendor access, organizations are realizing they need to do more with their privileged accounts and systems. But traditional approaches often leave organizations with wide gaps in security. Sam Elliott of Bomgar explains what companies need to look for when it comes to access...
Spear phishing is the common trigger to many of the most popular - and successful - targeted attacks. How can organizations improve their defenses to better spot - and stop - spear phishing?
Spear phishing and messaging-based threats tend to be the first attack vector that criminals are using today in targeted...
The digital transformation is well underway, with new market entrants and established players deploying new digital services that enable digital-first consumers to open new accounts and access services. With the volume of personal information publicly available in social networks and in the cyber underground,...
By applying a risk-based approach to identity assurance, organizations can go beyond a simple yes/no decision or step-up authentication process and add intelligence that provides broader context about the user and the situation in which they are requesting access.
Download this whitepaper and learn:
Why...
Even though most organizations do not have a "blank slate," it doesn't mean they can't rethink their IAM strategy. Acknowledging identity as the new perimeter, enterprises can reimagine how they utilize IAM to reduce unnecessary risk and cost and better enable the business.
Download this whitepaper to learn how...
Fraudsters recently ordered a total of nine iPhones and Samsung S8s from Sprint and Verizon with my personal details. With the internet awash in stolen personally identifiable information, are mobile operators doing enough to prevent fraudulent orders?
Whether it is insider or third-party privilege, locking down access has never been more important. The challenge is that the traditional responses to managing privileged access and identity access often leave companies exposed, because their focus is too narrow.
Download this eBook on access management and...
Fraud is constantly evolving, meaning your fraud prevention strategy needs the flexibility to change in order to keep pace and outmaneuver fraudsters.
Download this tip sheet to learn the tools you need to consistently outsmart the fraudsters regardless of their schemes and alternative methods.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.