Banking institutions are seeing a significant spike in multi-channel financial crimes. But Duncan Ash and Julio Gomez of Splunk say data and analytics can be key differentiators in the effort to protect sensitive financial data.
As organizations move toward remote work, security and risk management leaders should consider investing in MFA and access management for all kinds of remote access, and plan for rapid scaling.
Download this whitepaper to learn:
The challenges of securing remote access, such as the need to implement consistent...
Software Development and Application Security Testing is in a significant and accelerated digital transition.
But what are some of the specific trends your team should be paying attention to?
Download this eBook interview with Checkmarx's Global Director of Application Security Strategy Matt Rose to gain insights...
A majority of mobile finance apps lack the security controls and code hardening necessary to prevent applications from being compromised, according to recent analyst research. And relying on legacy methods - like network or perimeter protection that is incapable of detecting these kinds of attacks - can have dire...
Despite the takedown of the Trickbot botnet by Microsoft and others Monday, the malware is still functioning, and its operators retain the tools needed to rebuild their malicious network, some cybsersecurity experts say. So the impact, while significant, could prove to be temporary.
Ransomware attacks remain the top cyber-enabled threat seen by law enforcement. But phishing, business email compromises and other types of fraud - many now using a COVID-19 theme - also loom large, Europol warns in its latest Internet Organized Crime Threat Assessment.
Are you plugged into the growth of DNS traffic and other internet traffic as a transport for cyber-attacks?
Find out how the right security stack can help you find and resolve these challenging threats. Join Ed Smith, Corelight's Senior Product Marketing Manager; Gordon Beith, Gigamon's Senior Director of Product...
Microsoft collaborated with cybersecurity companies and government agencies to take down the million-device Trickbot botnet in an effort to help protect the Nov. 3 U.S. election and stop the global spread of ransomware and other malware.
CISA is warning that sophisticated hacking groups are chaining together vulnerabilities, such as the recent Zerologon bug and other flaws, to target state and local government networks. In some cases, attackers gained access to election support systems.
Steve Jobs once said: "Marketing is about values." But how well is the cybersecurity solutions message being received amid the convergence of pandemic and economic strains? We brought an outspoken group of CMOs and CISOs together to discuss the topic.
The U.S. Justice Department has seized 92 domains that Iran's Islamic Revolutionary Guard Corps was using to support a global disinformation campaign. This was the latest in a series of steps to crack down on Iran's interference activities.
A hacking group is taking aim at industrial targets in an ongoing cyberespionage campaign, security firm Kaspersky reports. The group, dubbed "MontysThree," uses a variety of techniques, including steganography, to avoid detection.
Within a few days of President Donald Trump testing positive for a COVID-19 virus infection, fraudsters began deploying phishing emails using the president's health as a lure, according to the security firms Proofpoint and KnowBe4.
Ransomware has emerged as the No. 1 online threat targeting public and private organizations this year. Seeking maximum returns, more gangs have moved beyond opportunistic attacks to target organizations with "post-intrusion ransomware." Meanwhile, many victims fail to report such crimes to police.