Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Email is the number one threat vector for ransomware. But the solution to ransomware is not simply blocking malware in an attachment. Attackers have pivoted to using email as the first step to gain access, which will ultimately allow them to deploy their ransomware or broker the access to someone who will.
Join...
According to a new threat report from Expel, business email compromise should now be viewed as "public enemy #1." Jonathan Hencinski of Expel is joined by Theodore Peterson of Datasite to support that claim and discuss how best to strategize against these schemes.
Business email compromise (BEC), also known as email fraud, is one of cybersecurity’s costliest and least understood threats. As BEC schemes have evolved, industry nomenclature has outlived its usefulness. Without a framework to describe and break down BEC attacks—let alone conceptualize them—researching and...
The ransomware landscape has changed a great deal over the past ten
years. Today, ransomware attacks are driven by three primary factors—
ransomware-as-a-service, extortion, and cryptocurrency—and each of
these variables influences the overall threat of ransomware in distinctly
different ways.
Download this...
Most security leaders know that an effective security awareness program can play an outsized role in reducing risk. But measuring—and communicating—the impact of your security awareness program to executives is not always easy. This e-book explores the ins and outs of security awareness programs to help you build,...
Understanding customer identities in the digital world is no easy feat: In the US, the average household has 10+ connected devices, and the average adult has 4 credit cards and over 100 online accounts.
Fraud teams must cut through the clutter to single out good and bad users, regardless of how many devices,...
We thought it was bad enough when traditional ransomware started to steal data in its second generation of evolution, now dubbed "double extortion". The third stage of ransomware is beginning to happen now and will make us wish for the good, old days of Ransomware 2.0.
Attend this presentation to learn how...
In 2021, there were 1,862 data compromises - a 68% increase over 2020, according to the Identity Theft Resource Center's Annual Data Breach Report. "In this past year, there were more cyberattack-related data breaches than there were all forms of data breaches in 2020," says ITRC COO James E. Lee.
North Korean advanced persistent threat group Lazarus - an entity sanctioned by the U.S. and the United Nations - has emerged with a fresh spear-phishing campaign that exploits Windows Updates to execute a malicious payload, using GitHub as a command-and-control server.
"Email security doesn't get the attention it deserves" because "phishing is not going away and is not getting any less," says Jess Burn, a senior analyst at Forrester. She shares best practices for phishing prevention.
Today’s world of work is difficult to define. Where and how work happens has fundamentally changed, and permanent hybrid working will inevitably strain an organization’s ability to detect cyber threats, especially as the trusted perimeter stretches to include remote workers.
The 2021 Global Workplace Report...
People are leaving their jobs in droves during the "Great Resignation," and the cybersecurity industry is not immune to the trend. Mike Hamilton, the former CISO for the city of Seattle, warns organizations about the opportunities this presents for cybercriminals and outlines how employers can work to retain talent....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.