It's becoming increasing important to detect adversaries that have bypassed your security controls and moved laterally in your environment, says Carolyn Crandall of Attivo Networks, who describes the role deception can play.
Security ratings and the analytics they provide give businesses a unique insight into their security performance and posture in relation to their peer group.
Security researcher Zammis Clark, who pleaded guilty to hacking Microsoft - with an accomplice - and later Nintendo, as well as stealing data and uploading malware to Microsoft's network, has received a suspended sentence.
As CSO of Mastercard, Ron Green has a clear view into the tactics of payment card fraudsters, as well as how the company is responding to fraud trends via its Fraud Fusion Center.
What are the prevailing fraud trends, and how are they impacting consumers, clients and enterprises? Dora Gomez, director of the New York City chapter of the Association of Certified Fraud Examiners, shares highlights of the ACFE's new Report to the Nations.
Do real-time payments inevitably lead to real-time fraud? Debra Geister of NICE Actimize describes some of the fraud challenges of moving to faster payments.
Arrests made last week by European, U.S. and other law enforcement agencies appear to have led to the closure of the "Dream Market" dark web site, which, in turn, disrupted certain ransomware attacks, according to an analysis by incident response firm Coveware.
Toyota Motor Corp. has reported its second data breach in the past five weeks. The latest incident, revealed Friday, may have exposed data on as many as 3.1 million customers.
As financial fraud has evolved, so have the defensive tactics of major banking institutions. Citi's Jeffrey Dant, a former Secret Service agent, discusses Citi's Fraud Fusion Center - it's mission, challenges and early successes.
How well can banking institutions apply the right amount of security to the right transactions at the right time? Tim Bedard of OneSpan answers this question in his analysis of ISMG's new State of Adaptive Authentication in Banking survey.
Malicious bot attacks now account for nearly one-third of all internet traffic, says Franklyn Jones of Cequence, who describes why conventional tools for fighting against these attacks are ineffective.
When a company plans to make an acquisition, it should conduct a "compromise assessment" to assess whether the organization being purchased has had an undiscovered breach, says Steve Ledzian, CTO for Asia Pacific at FireEye.
Microsoft is using its legal muscle to push back against an advanced persistent threat group that is says is "widely associated with Iranian hackers." Following court approval, it is taking control of 99 website domains allegedly used by the attackers as part of an ongoing spear-phishing campaign.
Distinguishing nation-state attacks from organized crime continues to grow more difficult because some attackers wear both hats, a Europol official reports. Further complicating the picture: Young attackers enjoy access to ever-more sophisticated and inexpensive tools and services.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.