By 2019, nearly 90 million mobile wallet users will be providing a valuable stream of interchange revenue and transaction data for wallet providers. Offering a mobile wallet is a competitive move that financial institutions and issuers simply cannot ignore. But attackers have interest in mobile wallets as well, and...
How can gaining visibility into indicators of exposure (IOEs) shrink layers of attack and more effectively contain incident? By understanding how network modelling and simulation can be used to visualize and analyze an attack surface, as well as understanding how to measure IOEs, such as vulnerability density,...
As fraudsters switch focus back to card-not-present schemes, research from consultancy Aite Group indicates that CNP fraud will soon outpace card-present fraud in the U.S. by a three-to-one margin. Globally, payments provider ACI Worldwide saw a 30 percent increase in CNP fraud in the first half of 2015. And ACI found...
Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates, which are already selling for more than $1,000 each in...
Cybersecurity has become a board of directors and C-suite issue, as numerous cybersecurity incidents over the past couple of years have proven. The tipping point could be viewed as the Target breach, since that breach led to direct effects on both the management team and the board.
The perception has been that...
With new technologies appearing almost daily, attackers have a constant stream of potential new tools, tactics and practices to evaluate as offensive weapons. This constantly expanding attack surface forces defenders also to assess new technologies, all while protecting an themselves amid an ever-escalating arms...
As information-security threats intensify, organizations risk becoming disoriented - focused more on grappling with complex technology, an explosion of data, increased regulation and a debilitating skills shortage. This is a huge danger, since prompt action is required to interpret an increasingly complex threat...
This panel will review some of the key themes discussed during the first day of the summit, and foreshadow how those key themes and others will be carried over into the next day. Which sessions will be hot, and how will tomorrow's speakers expand on the topics raised today?Additional Summit Insight:Hear from more...
What are the biggest threats to your organization's data? Recent high-profile cyberattacks would lead an organization to believe that its external threats are the most concerning. Unfortunately, this misconception allows another significant threat to your organization's critical assets to remain completely under the...
Distributed ledger technology, such as the blockchain, promises simplicity, speed and greater transparency in transactions that are conducted across the world, in payments and beyond. But what about the risks? How much do we truly understand about this emerging technology, and have we placed fintech on a pedestal too...
Although developed to support the infamous Bitcoin, the blockchain mechanism is proving to have a multitude of use-cases, from IoT micropayments to capital-market trading, retail banking and even voting.
The blockchain, in effect, is a distributed ledger, shared with hundreds of thousands of automated auditors that...
After any significant breach, many parties - ranging from customers, clients, business partners and government agencies - will demand clarity about how a breach occurred and what data was stolen.
In the U.S., the Federal Trade Commission acts to ensure that any given organization is not negligent or reckless with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.