Where are security practitioners in their zero trust journeys, and what approach to zero trust have they taken? Three experts - Netskope's David Fairman, Exceture's Mario Demarillas, and Petronas' Soumo Mukherjee - share their thoughts in a panel discussion.
New York State Attorney General Leticia James detailed a credential stuffing investigation that showed the compromise of 1.1 million user accounts linked to "well-known" retail operations. The 17 companies involved reportedly agreed to put new measures in place to mitigate cyber risks.
Morgan Stanley agreed to a $60 million settlement to resolve a class action lawsuit claiming the banking giant violated security compliance laws and provided negligent oversight when a third party did not properly decommission legacy IT systems in 2016 and 2019.
Synthetic ID fraud has grown in popularity, with U.S. companies reporting losses of $20 billion in 2021 compared to $6 billion in 2016. Cybersecurity experts discuss with ISMG why this type of fraud has gained traction, how fraudsters use it, mitigation steps, and what we can expect in 2022.
Advanced voice impersonation and deepfake technologies are giving rise to cybercrime groups that offer Vishing-as-a-Service, security researchers say. Vishing is proving to be successful in tricking victims and bypassing voice authorization mechanisms.
Marketers aim to use the right message to reach the right customer at the right time. That’s exactly what cybercriminals do, too — except they’re stealing your brand to sell
Download this report to learn more about why:
All brands are at risk;
Brands don’t realize the...
Ransomware attacks have been a reality for organizations of all sizes for quite
some time. In recent months, however, the volume and sophistication of attacks,
as well as the consequences, have been ratcheting up.
This whitepaper examines ten strategies that can reduce risk, build resilience, and help get...
On one hand, 60% of survey respondents rate their institutions as "above average" or "superior" when it comes to mitigating fraud. Yet, 55% say their customers and partners lack sufficient awareness to protect themselves from fraud. Appgate's Bryan Jardine analyzes the Faces of Fraud survey results.
The number of breach reports filed by U.S. organizations looks set to break records, as breaches tied to phishing, ransomware and supply chain attacks keep surging, the Identity Theft Resource Center warns. It says that there's also been a rise in tardy breach notifications containing little detail.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including why enterprises need a multilayered approach to securing identity, how fraud will evolve in 2022 and the need to secure backdoors to prevent ransomware attacks.
Microsoft has officially gone fully passwordless, allowing Windows users to replace their alphanumeric passwords with one of several substitute sign-in technologies to gain entry into a Microsoft product - a move received positively by industry insiders.
Massachusetts Attorney General Maura Healey says her office is probing the data breach at T-Mobile that exposed the personal information of 54 million people, including current, former and prospective customers of the carrier. The Federal Communications Commission is also investigating the incident.
The White House is preparing executive branch agencies to adopt "zero trust" network architectures by 2024, with CISA and the OMB overseeing the creation of technology road maps that departments must follow. This is a major component of President Biden's cybersecurity executive order.
Veriff’s industry-leading identity verification, KYC, and AML technology is able to process more than 9,500 government-issued ID documents from over 190 countries and match faces with biometric face recognition technology to verify millions of identities across the world.
Download Veriff’s H1 2021 Identity Fraud...