A new report from researchers at RSA describes how cybercriminals are using social media, including Facebook, to not only network about their attacks, but also sell card data and other compromised consumer information. Daniel Cohen of RSA FraudAction describes the report in this video interview.
Just back from a trip to Israel, where she spoke with leading security researchers about such topics as the Internet of Things, cyberterrorism and banking malware, Gartner analyst Avivah Litan says 2016 will be a turning point for adoption of biometrics in identity proofing. Learn why in this video interview.
Avivah Litan, Art Coviello, Raj Samani. These are among the thought leaders who were to meet with ISMG's editors at the RSA Conference on Wednesday. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA preview.
As the first day of RSA Conference 2016 sessions wrapped up, ISMG's editorial team sat down to discuss their takeaways from sessions and interviews. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA review.
As the first day of RSA Conference 2016 sessions was set to start, ISMG's editorial team sat down to discuss the event and what to expect from it. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA preview in this video report.
Cyber insurance covers more than the cost of breaches of data privacy; it can play a role in protecting against the cost of a cyberattack that disrupts business operations, explains insurance specialist Tim Burke in this video interview.
After a data breach, how can organizations cooperate with law enforcement without increasing the likelihood they'll face civil lawsuits? By sticking to the basic facts, says T.C. Spencer Pryor, partner at the law firm Alston & Bird, in this video interview.
To minimize the risk of business email compromise schemes and similar types of fraud, senior executives at businesses should avoid posting information about their activities on social media and other accessible forums, says security expert Chuck Easttom.
Organizations that discover they're victims of business email compromise exploits should immediately contact law enforcement officials to report the attacks to improve the odds of finding the perpetrators, says Assistant U.S. Attorney Camelia Lopez in this video interview.
As the U.S. moves toward faster payments, it must include new payments providers, such as Apple Pay and Square, as well as banks in all efforts to ensure security, says David Lott of the Federal Reserve Bank of Atlanta.
The moment a successful defense is deployed, attackers find new ways to break into networks. In this video interview, Dr. Dale Meyerrose describes the damage wreaked by APTs and the strategies organizations can use to keep attackers at bay.
Financial institutions no longer can rely on strong passwords or even two-factor authentication to secure their customers' data. Instead, they must weed out fraudsters through the use of behavioral analytics and passive biometrics, Ryan Wilk of NuData Security says in this video interview.
As cyberattacks become more sophisticated, organizations need to convert data into proactive threat intelligence, says Jim Penrose of Darktrace. In a video interview, he describes the concept of an "Enterprise Immune System."