The U.S. Department of Justice on Thursday released a redacted version of a confidential report prepared for the U.S. attorney general by Special Counsel Robert Mueller, summarizing his two-year investigation into Russian election interference and whether President Donald Trump obstructed the probe.
SOC processes are broken, analysts are feeling the cybersecurity job fatigue, and enterprises are still at risk. SOC leaders often struggle to understand how to make their teams more effective and end up spending their budget on point solutions that add to the problem of data overload. How do you improve security...
From blockchains and surveillance to backdoors and GDPR, a group of leading cryptographers rounded up the top cybersecurity and privacy matters of the day at the cryptographers' panel held at the recent RSA Conference 2019 in San Francisco.
When it comes to browser security, one mistake made by consumers and enterprise alike is that they see the browser as a one-way window into the internet. The reality is quite different - and potentially costly if overlooked, says Pieter Arntz of Malwarebytes.
"The price of fraud keeps going up, costing the global economy $41.6 trillion per year. Recognizing the four degrees of fraud is the first step in keeping fraudulent users off your platform. It's time to take a new approach to ID verification. Find out how, read our infographic.
What should you consider when choosing an identity verification provider? From technical requirements to key metrics and user experience, there's so much to think about.
That's why we've made a checklist for you - to help you evaluate all the different identity verification solutions.
Download the checklist to...
Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology?
Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to...
When it comes to user onboarding, there's a tension between security and convenience. Try to shortcut security, and you'll pay the price. But add too much friction and you'll struggle to scale. So how can you optimize your user experience to introduce just the right amount of 'friendly' friction and unlock...
Identity theft is the fastest growing crime in the US. Globally, 1 in 60 online transactions are fraudulent. And if you don't know who your customers are, you can't onboard them to your platform.
Download this ebook to learn more about the future of digital onboarding.
An Australian company that markets a smartwatch that lets parents monitor their children shut down its service on Monday after researchers revealed hackers could track a child's location, spoof the location, add themselves as a "parent" and view personally identifiable information associated with the account.
In the past, the relationship between cybersecurity and privacy has been uneasy and even ill-defined. But today, in the post-GDPR era, the relationship is clear, and so is the legal and compliance path forward, says David Ruiz of Malwarebytes.
The 2019 State of IBM i Security Study analyzed 244 servers and partitions, drawing participants from finance, retail, manufacturing, and many other industries. This is not a recurring study of the same systems each year, but general trends are apparent.
The study, now in its 16th year, reveals concrete, impartial...
Spear phishing is among the most dangerous cyberthreats - and the most difficult to detect. Not long ago, C-level executives were the sole target. Today, any person at any company is at risk of receiving targeted emails attempting to trick them into completing wire transfers, purchasing gift cards or fulfilling other...
Dark patterns are out to get you. The term describes the practice of abusing usability norms to create user interfaces that trick users into divulging their personal details or sacrificing their privacy. Bipartisan legislation proposed in the U.S. Senate, however, would make malicious design illegal.
Nearly one-quarter of the global cybersecurity workforce is now made up of women. But women still face significant compensation and other career challenges, according to a new study. Mary-Jo de Leeuw of (ISC)2 shares analysis.