The scale of connectedness we're experiencing is unprecedented. The pace of change and technology advancement in recent years could be compared to another industrial revolution. But the connectedness that allowed us to bring the power and security of the Visa network to each transaction in real time, also created the...
In the past six months, more than 7,000 sites that run Magento e-commerce software have been infected with malicious JavaScript designed to harvest customers' payment card details as they finalize their orders, a security researcher warns.
Financial fraud can be notoriously hard to detect and easy to cover up. But does blockchain technology with its distributed digital ledger now offer a new tool to help organizations reduce risk and prevent fraud? Which key business and technical factors will help blockchain scale for the large enterprise? Attend this...
For years now, leading-edge security thought leaders have called for organizations to shift from a conventional "peacetime" view of cybersecurity to more of a wartime mindset - acknowledging and responding to the aggressive tactics of global adversaries. It is time, then, for enterprises to shift from conventional to...
We are facing an inflection point in the world of cyber-attacks. Mega-attacks have spread fast to almost every country and every industry possible - from banking, transportation to healthcare to production lines. Regardless of all our current investments in cyber security, the majority of enterprises have experienced...
What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
Cyberattacks and damages due to business email being breached dramatically increased again this past year. The FBI estimates $5 billion in losses worldwide as email continues to be a primary attack vector for the initial compromise.
As organizations move their email infrastructure to cloud solutions like Office...
99% of account takeover attacks begin with automation, and they pave the way for future ATO. Today's sophisticated scripts can bypass traditional measures that rely purely on device intelligence or static data. Learn how to block sophisticated attacks with behavioral biometrics before they create fraud losses.
You...
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.
Apps for smartphones pose many privacy risks. But Venugopal C of Check Point says the European Union's General Data Protection Regulation, which is now being enforced, potentially could have an impact on the kind of information apps gather.
Brett Johnson was a career fraudster - he stole millions from victims by pioneering a plethora of cyber fraud schemes. Aaron Sherman is a career law enforcement agent - most recently operating as a cyber special agent with the FBI. Together, they offer a two-pronged look at some of today's top cybercrimes - how they...
Maintaining strong payments security practices is a continuously moving target given the ever-evolving payments ecosystem and dynamic nature of the threat environment. The commitment to improve security is a priority throughout the payments industry as evidenced by the ongoing collaboration across these issues. This...
Accidentally careless employees are the biggest cause of incidents involving data loss, responsible for almost 25 percent of all breaches.
Given that employees are the first line of defense against socially engineered schemes, such as account takeover, new account fraud and other crimes, doesn't it make sense to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.