The pivot to working from home (WFH) proved that enterprise IT organizations could do the unimaginable – and do it quickly and well. Once you realize you can move all your users to WFH in days instead of years, you start to wonder what else you can do quickly.
What digital transformation projects, long considered...
The U.S. is in danger of falling behind China and Russia in developing artificial intelligence technologies and countering cybersecurity threats that could develop as AI use becomes more widespread, according to a newly released report from the National Security Commission on Artificial Intelligence.
Penetration testing. Bleeding-edge technology solutions. A huge budget. Are these enterprise cybersecurity essentials … or could you ignore them and still have a comprehensive and effective cyber defense?
We all know that cybersecurity is an increasingly important part of our business life, and that it requires...
High-speed identity screening can play a critical role in cracking down on fraud tied to COVID-19 economic relief efforts without impeding legitimate access to funds, says Dr. Gary Shiffman, CEO of Giant Oak, which offers artificial intelligence technology.
The threat of bot scams to online retail is a growing problem in the industry. These days, bot traffic on e-commerce sites is causing an increasing amount of damage, and with the increasing sophistication of these bad bots, there is a need for an equally sophisticated solution.
In this industry-specific study of...
Your data is the most valuable resource on the planet.
Download this whitepaper to learn how digital transformation is creating new challenges for data security, where you should apply more effective security controls, and what an “Edge-to-End” security posture brings to the modern enterprise.
Ordr as a Representative Vendor in their recently released Market Guide for Operational Technology (OT) Security! The convergence of IT and OT calls for a multifunction platform that can discover all network connected devices, profile how they are communicating and properly assess the risk associated. This is why...
The U.S. government should take a number of steps to help minimize the risk that benefits provided by the next rounds of economic stimulus programs designed to provide relief from the impact of the COVID-19 pandemic are not fraudulently obtained, security experts say.
More fraudsters are using artificial intelligence to generate “Frankenstein faces” for use in synthetic identity fraud. Kathleen Peters of Experian outlines this disturbing development in fraudster behavior, as outlined in a new report.
To protect today's dynamic workforce, security teams must be equipped to discern when and how a trusted account has been leveraged for nefarious purposes. This requires more than just an understanding of 'good' vs 'bad' - it requires an 'immune system' approach to security that is not only adaptive, but also grounded...
As organizations increasingly rely on cloud and SaaS services to streamline business practices and supercharge innovation, the traditional paradigm of the network perimeter has rapidly dissolved. This has given way to a drastically increased attack surface across multiple environments - and it is continuing to...
As geopolitical tensions rise, the industrial sector is coming under increasing strain from state-sponsored cyber-attacks. Threats are becoming faster and more furious than ever, and with remote working added into the mix, security teams have been left overwhelmed.
The 2020 EKANS attack against Honda has...
Despite organizations adopting ‘secure’ email gateways and extensive employee training, 94% of cyber-attacks still start in the inbox. It’s clear a more advanced approach to email security is needed.
Able to spot the subtlest signals of attack, Darktrace Antigena Email recognizes malicious activity even...
Once a catalogue merchant, The Very Group is now one of the UK’s largest digital retailers. And with transformation came significant cybersecurity challenges. Michael Duncan of The Very Group and Hitesh Sheth, CEO of Vectra AI, discuss the path to automated threat detection and response.
In an eBook with ISMG,...
Digital wallets, super apps and digital IDs all have substantial roles in the new consumer landscape. And identity proofing is critical for the fraud-prevention success of each of these emerging technologies, says Shai Cohen of TransUnion.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.