Credit card losses due to synthetic identity fraud exceeded $800 million in the U.S. last year, says Julie Conroy of Aite Group, who analyzes the evolving threat and offers mitigation insights.
Law firms in the US are increasingly being targeted by hackers using elusive new malware variants. The method most preferred by attackers hides malicious payloads inside email attachments.
So far this year, this technique has made up over 70% of all known cyber breaches which makes document-based malware by far the...
Compliance comes down to behavior. Ask yourself: are your users utilizing protected data sets in an appropriate manner? While most organizations focus on establishing security controls around access, the true test of compliance revolves around visibility into what users do after accessing data.
In the financial...
At its core, compliance for HIPAA is simply about maintaining patient privacy by ensuring your users appropriately access and use patient data. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed.
The challenge, however, is the lack of visibility into what users do with...
Eduard Goodman, global privacy officer of CyberScout, doesn't like the disorganized way most cyber incidents are handled now. Instead, he would like to see a more project management approach. Here are the benefits he foresees.
With the rise of P2P payment networks and the U.S. working toward a real-time national payments network, the push is on to battle fraudsters. Also, attackers are hacking legitimate websites to more stealthily distribute "Gandcrab" crypto-locking ransomware.
The fraud economy on the dark web is a streamlined source of trade in payment card and personal data. Fraudsters have a range of resources at their disposal to help them maximize the value of these accounts, and the communities of cybercriminals collaboratively develop new ways to grow and automate their...
According to the Cisco 2017 Annual Cybersecurity Report, over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent.
Investing in good security is a must, but so is spending wisely to ensure you get the maximum impact from...
When it comes to fraud, enterprise data has a story to tell, and it's up to security and fraud leaders to know how to interpret that story.
Download this whitepaper to learn more about:
How to recognize fraud in your environment;
How to quickly spot anomalous behavior;
Best practices for using machine data and...
The Gandcrab ransomware has been a moving target. Since it was discovered in January, it quickly became one of the most widely distributed file-encrypting malware programs. Researchers with Cisco say they've now found it seeded within legitimate websites, making its spread tougher to stop.
When it comes to fraud, enterprise data has a story to tell, and it's up to security and fraud leaders to know how to interpret that story. Jim Apger of Splunk discusses reading and reacting to these stories.
What are the latest trends in BEC attacks? Does your organization have the security controls and resources in place to defend against them?
Download this report featuring exclusive BEC research and learn:
Which malicious emails bypass traditional email security protocols;
What a typical organization sending BEC...
Finding out your healthcare organization has been breached can be devastating news. Knowing how to deal with an intruder who has broken through your cyber defenses can be even more challenging.
This whitepaper offers practical steps healthcare IT and security professionals should take after a cyberattack occurs....
One of the biggest challenges in stopping data breaches lies in sifting through vast amounts of data to find the proverbial "needle in the haystack" - the subtle clues that indicate an attack is imminent or underway in your public agency or government organization. As modern computer systems generate billions of...
Building your organization's cybersecurity maturity doesn't happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you've made an initial investment in security.
This whitepaper...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.