ISACA's recently published Privacy in Practice 2023 survey report shares new research related to the privacy workforce, privacy skills, privacy by design and the future of privacy. Expert Safia Kazi shares ways organizations can align privacy goals with business objectives.
This report is filled with forward-looking insights and commentary from several industry experts.
With 20 distinct observations, the Forecast covers topics such as:
More individual attacks by actors motivated by bragging rights not profit;
More extortion attacks especially in Europe who is poised to take the title...
Despite the proliferate adoption of multi-factor authentication (MFA), a record number of account takeovers (ATO) and stolen passwords continue to plague the digital world. MFA is no longer a nice-to-have — it is a standard.
Even so, fraudsters have evolved with common security practices and continue to pose a...
Modern organizations often have complex cloud and on-premise environments often managed with siloed security tools. This situation leads to fragmented visibility, an inability to prioritize risks for remediation and a lack of business-level reporting.
In this webinar, security leaders will learn how cloud security...
The latest edition of the ISMG Security Report shares tips for security leaders to navigate the threat landscape next year, discusses cybersecurity and privacy policy shifts to watch, and explains why global political and economic instability should not be cause for cybersecurity budgets to drop.
Cloud email security: It involves new strategies and tools to defend against a new wave of attacks. Arun Singh of Abnormal Security discusses the latest flavor of email attacks and the new Knowledge Bases created to help enterprises increase their education and defensive capabilities.
The email attack vector. It may not earn much discussion, but the adversaries take full advantage of it with phishing, BEC and now email platform attacks. Mike Britton, CISO of Abnormal Security, talks about the latest threat trends and how to detect and defend against them.
A hacker selling a data set purportedly containing emails stripped from the FBI's InfraGard public-private cybersecurity forum obtained access by sending an application, which the bureau approved, reports independent cybersecurity journalist Brian Krebs.
What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords with ease? And what can/should you do to improve your organization’s authentication methods?
Password complexity, length, and rotation requirements are the bane of IT...
The 2019 seizure by U.S. law enforcement of online criminal marketplace xDedic is paying dividends for lawyers unrolling prosecutions of accused fraudsters who allegedly obtained compromised credentials from the site. The FBI and IRS estimate that xDedic facilitated more than $68 million in fraud.
Application fraud has spiked - particularly bogus new accounts - and organizations are scrambling to improve fraud detection mechanisms without negatively affecting the legitimate customer's experience. Robin Love of Early Warning shares insights on how to better predict new account risk.
Most businesses say that preventing fraud is their top concern—and that challenge is only getting harder. The worry is understandable given that fraud increased by 70% in the last year to more than $5.8 billion.
There is a growing expectation to secure themselves that businesses recognize as well as to protect...
Since the pandemic began, 55% of consumers have higher expectations for their digital experience and that expectation is only growing.
Users — from individual consumers to various small businesses — expect the ability to interact with just about every service online these days. Failure to offer a smooth...
Synthetic identity fraud is the fastest-growing financial crime in the country. By combining real and fabricated personal information, a synthetic identity is specifically designed to look and act like a valid identity - until it doesn’t, leaving financial losses and criminal activity in its wake.
The Abnormal Security team just launched a new threat intel site named Abnormal Intelligence. Crane Hassold shares resources available, including an attack library, semi-annual threat intel reports, a glossary and exclusive insights from the Abnormal team.
In this ebook with Information Security Media Group,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.