Multifactor authentication needs to move away from one-time passwords sent via text message and embrace modern standards that prevent man-in-the-middle attacks. Plus, excessive identity challenges online lead to 20% of e-commerce transactions being abandoned, say experts at Authenticate 2022.
Since credential leaks are so common in cybersecurity incidents and breaches, how is it even possible to protect identities? Corey Nachreiner of WatchGuard Technologies shares strategies for how enterprises can upgrade their approach to identity security.
Both internal and external fraud are expected to grow as economic conditions worsen. Fraud education expert Andi McNeal shares insights on what anti-fraud practitioners are expecting over the next year, the types of fraud to watch out for and how to mitigate fraud risks.
Millions are spent on security operations centers — in tools, processes, and people — yet we still have million-dollar problems.
It’s not from a lack of passion or effort from security analysts and responders in the SOC; it’s often due to an efficacy gap and a lack of adversary alignment. The leading...
Passwords are supported everywhere. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy." In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords.
In PWC’s 25th Annual Global CEO Survey, respondents listed cyber risks as their top threat to growth.
Download this eBook to learn about
How to understand what is and isn't covered within a cybersecurity policy;
The techniques you need to have in place to help meet cyber insurance requirements....
Australia's Optus telco is facing a $1 million extortion demand to prevent the release of up to 11.2 million sensitive customer records. The data appears to be legitimate. The attacker tells Information Security Media Group an unauthenticated API led to the breach.
Japanese conglomerate Hitachi has sold its small identity-as-a-service practice to Canadian software specialist Volaris Group to drive better execution around core products. The firm found it was easy to get lost within Hitachi given the conglomerate's size and focus on electronics and engineering.
A U.S. law enforcement investigation involving multiple countries resulted in the shutdown of an online marketplace selling millions of Social Security numbers, payment cards and other credentials. Prosecutors unsealed a complaint against a Moldovan man fingered as the operator.
In today’s connected world, securing web applications and APIs from a wide range of threats — from web app business logic attacks and API abuse to bots — is critical for business success. However, securing digital properties amid cloud journeys, modern DevOps practices, and constantly changing applications and...
A month after his firm was taken private in a $6.9 billion deal, SailPoint founder and CEO Mark McClain discusses the prospect of consolidation, emerging competition and plans to expand "more quickly and aggressively" in the identity governance space - thanks to Thoma Bravo's financial backing.
Why is business identity theft increasing, and what are the latest tactics fraudsters are using to scam businesses and gig workers? Eva Velasquez, CEO at the Identity Theft Resource Center, shares her views on how business identity theft has evolved over the years and how to prevent it.
Insurance market giant Lloyd's of London says that starting next year, its cyber insurance policies will no longer cover state-sponsored cyberattacks. But with attribution being inherently tricky, expect this move to be tested in court, says Jonathan Armstrong, a partner at Cordery law firm.
In the latest weekly update, four Information Security Media Group editors discuss key cybersecurity issues, including the high cost of BEC scams, a Cuba ransomware gang's attack on Montenegro, and why so many hacktivists couldn't overcome the technical ennui of the Russia-Ukraine cyberwar.
As the economy places a greater emphasis on operational continuity, speed, and agility, API security is crucial for digital firms. In 2022, API security violations will be the most common attack method for data breaches in enterprise web apps, predicts Gartner.
The concern of unjustified exposure of the valuable...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.