With the rapidly changing threat landscape, protecting your enterprise from breaches and account takeover fraud has never been a bigger challenge. Fraud teams have the challenges of understanding customer identities and human behaviors regardless of how many devices and accounts they use.
The most productive security teams are going beyond the use of tactical tools for investigation and reporting of security incidents. Instead, they are taking a more strategic, proactive, platform-oriented approach to identifying and assessing security-related risks, proving compliance, and maturing the flexibility and...
In the latest weekly update, editors at Information Security Media Group discuss important cybersecurity issues, including the White House warning about escalated cyberthreats from Russia, the impact of the Russia-Ukraine war on the healthcare sector and why combating SIM swap fraud remains challenging.
As the landscape of brand protection evolves, learn what organizations can do to protect themselves from losing prospects, brand affinity, and customer loyalty to cybercriminals who impersonate their brands to scam customers and prospects.
The scary fact is that the majority of data breaches are caused by human error. With so many technical controls in place hackers are still getting through to your end users. How are they so easily manipulated into giving the cybercriminals what they want? Well, hackers are crafty. And the best way to beat them is to...
Learn how advanced analytics and machine learning help financial organizations proactively detect and prevent fraudulent payments.
As new payment types proliferate globally, payment and identity fraud is also skyrocketing. In 2021, global card fraud losses hit a staggering $28.58 billion.
To survive and stay...
Everyone saw the Colonial Pipeline attack in the news media, and ever since ransomware has become a household word. Most people understand that ransomware involves black hats putting code on people’s computers that, once triggered, causes them to lock up, and some people even know that encryption is involved, but...
With uncertainty rampant, 2021 saw a rise in the volume, variety, impact, and sophistication of phishing attacks. As the pandemic rumbled on in the United States and elsewhere, and displaced employees were still trying to get a grip on their new lives, more opportunities arose for phishers to exploit the spaces...
The battle against email-borne cyber threats continues. While vendors are hard at work building sophisticated email security controls intended to stop phishing tactics, attackers continue to prevail, evading even the most advanced analytics. New, innovative email security solutions that directly involve the end-user...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Many organizations face an upward battle when detecting and preventing fraud.
Consumers continue to migrate to digital channels and while organizations are
benefiting from this transition, it comes at a price. Where transactions occur, fraudsters follow, seeking out new vulnerabilities to exploit.
In this webinar,...
By baselining cyber maturity, one can create an organization's risk profile - and that is the key to being able to build a road map for prioritizing and addressing business risk. ISACA's Brian Fletcher shares insights on establishing the maturity goals for one's unique organization.
"Shadow data" - it's the new "shadow IT," and it puts your enterprise data at potential risk in public cloud environments. Amit Shaked, CEO and co-founder of Laminar, defines the risk, explains the threat and describes how best to mitigate it.
Email is the number one threat vector for ransomware. But the solution to ransomware is not simply blocking malware in an attachment. Attackers have pivoted to using email as the first step to gain access, which will ultimately allow them to deploy their ransomware or broker the access to someone who will.
Join...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.