The accelerated consumption of digitized services has not only changed the banking landscape - it has affected anti-money laundering risks and defenses. David Stewart and Paul Franks of SAS weigh in on emerging risks, defenses and shifts in the AML compliance landscape.
Yelp gives its employees the flexibility to use the applications or tools required to be as productive as possible. With that flexibility, however, came the risks of Shadow IT, which is the use of software without explicit IT department approval. In order to allow their employees to maintain flexibility with...
Employees with too much access can pose an insider threat. When employees have access to more than they need to do their job, there are more opportunities for mistakes, whether accidental or not. Lack of accountability means you
don’t know who did what, when. If too many people have the same level of access and...
In this eBook, Okta defines and discuss four key phases on the path to customer identity and access management (CIAM) maturity and the pain points that companies encounter in each phase of the maturity curve. Okta proposes solutions for each of these problems, providing a roadmap for the tools and processes you should...
You've no doubt used customer identity and access management (CIAM) in your personal life as a customer of other businesses - whether you realized it or not. Perhaps you've logged into a website to purchase concert tickets. Or maybe you've used your social media account to log into a new e-commerce site. You may have...
Over the years, this leading global hospitality company built a complex IT environment that included corporate machines, personal devices, kiosks, and home-grown and purchased applications—all housed in a large on-prem infrastructure. Heading into this decade, the company began adding cloud services, such as...
As we put a tumultuous year in the rear-view mirror, many companies are looking for innovative ways to boost and redesign their businesses in order to jump-start growth. According to Gartner, the majority of CEOs say recovering revenue levels by accelerating digital initiatives will be a top priority in 2021 and 2022....
Facial recognition as a tool is not bad, but the manner in which it is used can make it look bad, says Brett Johnson, a consultant on cybersecurity, cybercrime and ID theft who was a central figure in the cybercrime world for over 20 years.
Digital newbies who began using online services during the COVID-19 pandemic are not very aware of organized crimes such as scams, and this increases the number of fraud incidents, says Charles Subrt, director of the fraud and AML practice at Aite-Novarica Group. He says financial institutions need to create a full...
In 2021, there were 1,862 data compromises - a 68% increase over 2020, according to the Identity Theft Resource Center's Annual Data Breach Report. "In this past year, there were more cyberattack-related data breaches than there were all forms of data breaches in 2020," says ITRC COO James E. Lee.
Eva Velasquez, CEO of the Identity Theft Resource Center, shares six predictions for 2022 that show a shift from identity theft to identity fraud as cybercriminals continue to refine who they target, what information they steal and what they do with it.
In 2022, there will be a push for identity management capabilities that are behind the scenes and built into processes, says Peter Tapling, a board member on the U.S. Faster Payments Council.
Although e-commerce fraud steals headlines, the truth is that losses from false declines are higher. In fact, they are 70 times higher—$443 billion in 2021. Explosive growth in e-commerce is one reason. However, several factors can trigger false declines.
Read this whitepaper to:
Reduce manual review times
...
Amid the current ransomware surge, it's time for the principle of least privilege to meet endpoint security and be a new foundational security control, says David Higgins of CyberArk. He outlines the cybersecurity use cases and potential business benefits.
Applying cloud access security broker’s three functionalities - API-level integration with managed device transfer for visibility, in-line CASB for proxy and other devices, and its control over cloud and other access points - helps provide better control and the ability to protect and secure user access, says Thomas...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.