This podcast explores the security risks materializing as a result of the pandemic the readiness of enterprises to handle fraud risks (particularly in the IVR) and recommended strategies to secure the IVR.
Open source software is created by talented software developers from around the world who donate their time and intelligence to create software and components, then provide those free of charge to anyone wishing to
use them under the terms of their licenses (including the Beerware license).
The benefits open source...
Organizations are using DevOps and Agile practices, coding in containers
and microservices, and adopting Kubernetes at a record pace to help
manage all these components. Even five years ago, the level of agility,
speed, and flexibility the cloud-native stack enables was but a dream.
Since Google first introduced...
How do you protect your customers and employees from rampant phishing and typosquatting attacks that pop up every day? Criminals are banking on the fact that you can't find every single one to block them or warn customers and employees about every new attack. Bolster protects against phishing and typosquatting scams...
As investigators probe the SolarWinds hack, they're finding that the supply chain campaign appears to have deeply compromised more than the 50 organizations originally suspected. Meanwhile, the federal agencies overseeing the investigation now officially believe a Russian-linked hacking group is responsible.
There's been a lot of hype around Secure Access Service Edge (SASE) since Gartner coined the term in mid 2019. While Gartner predicts that 40% of companies will adopt a SASE architecture in the next 3 years, there is no single industry standard view on what constitutes SASE and how to deploy it in practice. What is...
The latest edition of the ISMG Security Report offers leadership lessons from Equifax CISO Jamil Farshchi and Mastercard's deputy CSO, Alissa "Dr. Jay" Abdullah. Also featured: An assessment of cybersecurity priorities for President-elect Joe Biden.
What's needed to make a shift from traditional IAM to CIAM? To start, an organization needs to look at fraud detection solutions and risk-based authentication technologies such as device intelligence and behavioral biometrics, says David Britton of Experian.
The cloud security solutions market is growing rapidly and there are many types of solutions to support your specific business needs. But figuring out the right tool can be difficult. This guide distills the main concepts of five archetypes that fall under the broader cloud security management platform...
The SolarWinds breach is a case study in how attackers can subvert a widely used piece of software to turn it to their advantage, says Lou Manousos, CEO of RiskIQ. The attack surface management expert details lessons all organizations must learn in the wake of this "unprecedented" attack.
Britain's National Crime Agency says 21 individuals have been arrested on suspicion of purchasing personally identifiable information from the WLeakInfo website. Authorities say the site provided access to more than 12 billion personal records culled from 10,000 data breaches.
First you had 'shadow IT,' then 'shadow cloud.' Now enterprises are encountering 'shadow APIs' - and the lack of visibility into these interfaces is causing new, often overlooked cybersecurity vulnerabilities, says Subbu Iyer of Cequence Security.
Federal, state and local governments are among the many victims of the supply chain attack that backdoored the SolarWinds' Orion network-monitoring software, and victims "may need to rebuild all network assets" being monitored by the software, the U.S. Cybersecurity and Infrastructure Security Agency warns.