How can an enterprise without a traditional perimeter understand and defend against orchestrated attacks designed to evade detection? JP Blaho of NETSCOUT Arbor offers insights on how to gain visibility.
In addition to relying to heavily on anti-virus and anti-malware tools, small and midsize enterprises lack the resources or expertise to catch new and sophisticated forms of attacks, says Dell's Brett Hansen, who offers strategic insights.
How do machine learning, threat intelligence and advanced analytics blend together to form agile and accurate fraud prevention? Avner Gideoni of IBM Security's Trusteer division explains the concept of "laser-cut fraud prevention."
Using artificial intelligence and machine learning in cybersecurity has pitfalls, says McAfee's Steve Grobman, who describes appropriate steps to take.
Vendor risk management must be a higher priority in all business sectors and must extend beyond security to include privacy, says Kabir Barday of OneTrust.
Alert fatigue is a major challenge, and the ability of SOC teams to be proactive is hamstrung by the fact that they spend a lot of their time in doing repetitive work, says Cody Cornell of Swimlane, who advocates broader use of orchestration and automation.
Taking a workflow-driven approach is critical to successfully embrace security automation, orchestration and response - or SOAR - technologies, says Dan Sarel of Demisto.
It's becoming increasing important to detect adversaries that have bypassed your security controls and moved laterally in your environment, says Carolyn Crandall of Attivo Networks, who describes the role deception can play.
Security ratings and the analytics they provide give businesses a unique insight into their security performance and posture in relation to their peer group.
Security researcher Zammis Clark, who pleaded guilty to hacking Microsoft - with an accomplice - and later Nintendo, as well as stealing data and uploading malware to Microsoft's network, has received a suspended sentence.
As CSO of Mastercard, Ron Green has a clear view into the tactics of payment card fraudsters, as well as how the company is responding to fraud trends via its Fraud Fusion Center.
What are the prevailing fraud trends, and how are they impacting consumers, clients and enterprises? Dora Gomez, director of the New York City chapter of the Association of Certified Fraud Examiners, shares highlights of the ACFE's new Report to the Nations.
Do real-time payments inevitably lead to real-time fraud? Debra Geister of NICE Actimize describes some of the fraud challenges of moving to faster payments.
Arrests made last week by European, U.S. and other law enforcement agencies appear to have led to the closure of the "Dream Market" dark web site, which, in turn, disrupted certain ransomware attacks, according to an analysis by incident response firm Coveware.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.