The global fraud landscape has shifted dramatically in the past year. Uri Rivner and Erin Englund of BioCatch discuss the urgency of catching money mules, stopping synthetic IDs and schemes that result from deep social engineering.
Increased reliance on the agile and remote work model has created more opportunities for MSPs. WatchGuard CEO Prakash Panjwani shares advice on how to engage an MSP that fits into the organization’s business model and establish a good partnership.
Using deception technologies can impose a cost on cybercriminals and help reduce dwell times and increase visibility, says Acalvio CEO Ram Varadarajan.
A key disconnect exists between awareness of financial services fraud schemes and mitigation, according to the latest "Faces of Fraud" survey sponsored by Appgate. Mike Lopez, vice president at the firm, describes some key findings.
Which are the most dangerous new attack techniques? How do they work? How can you stop them? What's coming next and how can you prepare?
This fast-paced briefing features the three people best positioned to provide answers and best able to communicate them:
the nation's top expert/teacher on mobile forensics
the...
The Framework for Improving Critical Infrastructure (commonly known as the Cybersecurity Framework) was released by NIST in April 2014. In April 2018, NIST released update v1.1 of the Framework to enhance and clarify the Cybersecurity Framework based on comments from across all industry sectors.
This session...
Each year at RSA Conference, SANS Institute provides the authoritative summary of the most dangerous new attack techniques. Their 2019 list included accurate predictions of smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks and CPU flaws.
Learn more about their 2019 list, see new data about...
From blockchains and surveillance to backdoors and GDPR, a group of leading cryptographers rounded up the top cybersecurity and privacy matters of the day at the cryptographers' panel held at the recent RSA Conference 2019 in San Francisco.
Vendor risk management must be a higher priority in all business sectors and must extend beyond security to include privacy, says Kabir Barday of OneTrust.
PSD2 requirements for strong authentication and third-party bank account access go into effect this September. Angie White, product marketing manager at iovation, discusses the implications of the directive inside and outside the European Economic Area.
Netscout is out with its latest threat report, and the research offers some startling new insights into DDoS, advanced threats and the commercialization of cybercrime. Hardik Modi offers analysis.
CrowdStrike is out with its 2019 Global Threat Report, which includes a ranking of the most dangerous nation-state adversaries. The company's CTO, Dmitri Alperovitch, discusses the report's key findings about threats and threat actors.
As enterprises embrace strategies built around digital risk management, it isn't that technology becomes a less important conversation. Instead, it's more strategic. Zulfikar Ramzan, CTO of RSA, outline's technology's role in the business path forward.
AT&T has just re-branded its AlienVault acquisition as AT&T Cybersecurity. Javvad Malik, security advocate for the firm, explains its place in the global market and how it will impact delivery of threat intelligence.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.