As e-commerce explodes during the global CIVD-19 pandemic, transaction authentication is more critical for fraud prevention, says Phil Dunkelberger of Nok Nok Labs, who discusses the latest fraud trends.
For many cybercrime investigators, it's all about indicators of compromise - evidence that a crime has occurred. But what if you were to shift toward cataloging behaviors that could indicate an attack is ongoing or imminent? Sam Curry of Cybereason explains the IoB concept.
The "zero trust" network architecture model is 10 years old - and suddenly more relevant than ever. How does John Kindervag, the creator of zero trust, feel about his "baby" today, and what advice does he give to organizations looking to adopt the model?
Enterprises long have practiced workforce identity and access management, but increasingly they are rolling out customer IAM, or CIAM. What's driving the trend, and where should cybersecurity leaders look to assert influence? Keith Casey of Okta explores some CIAM myths and realities.
A global health crisis. A remote workforce. Economic uncertainty. These are key ingredients to fuel the insider threat. Randy Trzeciak of the CERT Insider Threat Center at Carnegie Mellon University offers tips for monitoring risky behavior and creating positive incentives to reduce risk.
Using location data to warn people who have come in contact with those infected with COVID-19 holds promise to stem the deadly pandemic. But with that comes privacy concerns. Cryptologist Vanessa Teague breaks down risks and solutions.
A month-plus into pandemic response, what have enterprises learned from deploying and securing a nearly fully-remote workforce? Thomas Bieser of Okta shares lessons and the benefits of accessing critical apps and tools via the cloud.
Before the COVID-19 pandemic, venture capitalist Hank Thomas helped launch SCVX, a cybersecurity-focused special purpose acquisition company. Post-pandemic, Thomas sees a bright future in filling what he sees as the market need for a scalable, integrated platform.
The transition to a remote workforce in recent weeks has significant security implications, according to Nathan Howe and Kevin Schwarz of Zscaler, who provide guidance on mitigating the risks in this preview of an upcoming virtual roundtable discussion.
Gartner analyst Avivah Litan says China is attempting to leverage blockchain technology in the country's COVID-19 recovery. What are the benefits and concerns of this approach, and how should it shape the future use of blockchain?
The cyberthreat and fraud landscape is ever-changing, and attackers are upping the game with more advanced attacks. The COVID-19 pandemic has accelerated socially engineered schemes, such as phishing and virus-related scams. CISO Stephen Fridakis and consultant Rocco Grillo discuss how to ramp up defenses.
The COVID-19 pandemic has dramatically changed how we live and work - for now. But will some of these changes last beyond the crisis? If so, what impact can we expect on cybersecurity and privacy? Thought leaders Edna Conway of Microsoft, Michelle Dennedy of DrumWave and Wendy Nather of Cisco share their views.
With a global remote workforce, the concept of secure identity has never been more critical. What is the present and future of identity? In a preview of an upcoming virtual roundtable discussion, SecureAuth's Bil Harmer shares his vision.
Identity and access management for the workforce? Cybersecurity leaders are all over that. But what about customer IAM? There's plenty of room to grow there, judging by Dallas roundtable discussion featuring Richard Bird of Ping Identity and Gray Mitchell of IDMWORKS.
When it comes to threat hunting, what are the complementary uses of SIEM and EDR technologies? What are the unique use cases for each, and how can they coexist? Sam Curry of Cybereason shares tips in advance of a virtual roundtable discussion.