Faster payment technology has been around for years, but fraud continues to dominate the conversation, says Reed Luhtanen of the U.S. Faster Payments Council. Luhtanen says all payment systems have a fraud problem, and firms will be able to curb faster payment fraud with more experience and data.
With signs pointing to a global economic downturn, cybersecurity organizations are already thinking about managing budgets and doing more than less. Four CISOs share a wide range of belt-tightening tips, from putting the squeeze on your vendors and suppliers to training and hiring from within.
With the U.S. COVID-19 public health emergency expected to end in May, the government is set to scrutinize telehealth providers for HIPAA violations. That’s why healthcare firms should review their telehealth platforms and vendors, says privacy attorney Adam Greene of Davis Wright Tremaine.
In the latest weekly update, John Kindervag, creator of zero trust and senior vice president of cybersecurity strategy at ON2IT, joins ISMG editors to discuss the top zero trust storylines of the year, the impact of ChatGPT on the cybersecurity industry and how to tackle MFA bypass attacks.
According to the Forrester Wave issued in December 2022, the top challenge security analytics vendors face when bringing SIEM, SOAR and UEBA together is making it easy for customers to manage and maintain the offering, says Forrester analyst Allie Mellen.
The adoption of new technologies, multi-cloud architectures and multiple data storage sites has resulted in data residing in more places than ever before. That's why enterprises need a single pane of glass to know who's touching their data and why, says Imperva CEO Pam Murphy.
The false positive rate for detecting check fraud typically is very high because it's such an analog process. To detect fraudulent checks faster, banks need to pair their legacy detection capabilities with image analysis solutions, says Trace Fooshee, strategic adviser with Aite-Novarica Group.
In the latest weekly update, ISMG editors discuss the ESXiArgs ransomware campaign that has snared 2,800 victims, the data breach reported in an SEC filing by a multistate hospital chain, and Check Point's building of SD-WAN capabilities that are integrated with the company's network security stack.
Forcepoint's new Security Service Edge offering allows clients to apply access, threat or data loss protection policies across all channels as soon as they're implemented. The firm long offered DLP, SD-WAN, SWG and CASB tools, but the lack of full integration made it tough to apply unified policies.
Threats from API and application vulnerabilities increased in 2022, but ransomware, human error and hygiene continue to pose the greatest threats to organizations, according to findings from CyberTheory's 2022 Performance Study. CyberTheory's Steve King shares how education can make a difference.
First-party fraud is all about intent and banks have to determine whether the person carrying out the transaction is doing it intentionally. That's hard to do for a basic binary decision model, says Steve Lenderman, senior vice president/director of global loss prevention and fraud, BM Technologies.
Ahead of RSA Conference 2023, Greg Day, a program committee member focusing on "hackers and threats," previews top themes at this year's event. Day, a member of the RSA Conference program committee, says one common theme is "old vulnerabilities and threat techniques being used in new environments."
Before healthcare entities can promise advanced identity and access management technologies and practices, their IAM programs need to address important fundamentals, which many entities still struggle with due to the complexity of healthcare itself, says Erik Decker, CISO of Intermountain Health.
Identity verification and lack of WebAuthn implementation in legacy applications and smartphones are two of the biggest challenges associated with adopting FIDO authentication. Merck Germany's Andreas Pellenghar also says the current setup of jumping to a browser to log in is turning people off.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.