Human Security has gone back to the M&A well once again, scooping up a Baltimore startup to prevent adversaries from surreptitiously embedding malware into digital advertisements. The acquisition of Clean.io will help Human take on malvertising, which has become a prolific way to spread botnets.
If there’s anything 2022 can teach us, it’s that fincrime Is unpredictable.
This year has been shaped by rapidly changing fraud activities and scams… and increasingly brazen fraudsters. Neither individuals, businesses, government entities, nor financial institutions (FIs) are exempt from the velocity and...
The holidays are just around the corner to usher in a bustling season of togetherness, shopping, travel, and charitable donations. It’s a special time of year for many of us - including fraudsters and cybercriminals.
Frauds and scams accompany the season as bad actors take advantage of spikes in online activity...
When it comes to cybersecurity, an organization is only as protected as its weakest link. In today’s security environment, employees are increasingly at risk to become victims of malware or phishing attacks as cybercriminals exploit gaps in security such as weak passwords or lack of an authentication strategy.
To...
It is often hard to let go of tried and tested enterprise applications: legacy applications are often intrinsically integrated into business processes, making them difficult to replace or upgrade. In fact, by 2025 Gartner expects that 90% of current applications will still be in use and have insufficient...
Millions are spent on security operations centers — in tools, processes, and people — yet we still have million-dollar problems.
It’s not from a lack of passion or effort from security analysts and responders in the SOC; it’s often due to an efficacy gap and a lack of adversary alignment. The leading...
Over his 23-year career in cybersecurity, Tom Kellermann has focused on policy, endpoints and even strategic investments. Now, in his new role as senior vice president of cyber strategy at Contrast Security, his mission is to protect code security - particularly in the public and financial sectors.
The latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia's biggest data breach incidents, the state of code security today and the growing trend of private equity firms pursuing take-private deals.
SaaS applications have become essential supporting collaboration and ensuring easy access to files and folders from anywhere to keep workforces productive and connected.
Unfortunately, many organizations still believe that these tools are completely secure and make the need for backup obsolete. This simply isn’t...
Compliance isn’t exactly the most exciting side of cybersecurity. But like it or not, much of our work to secure digital assets boils down to implementing and validating checklists of controls that prevailing wisdom holds to be effective.
During this webinar, experts from RiskRecon and Cyentia Institute will...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.