Smartphone cameras and microphones act as the eyes and ears of the digital age, capable of capturing the smallest audio and visual details in high-definition clarity. Unfortunately, threat actors have demonstrated the ability to hijack these smartphone components, using them to gain valuable insights about targeted...
Security technology innovations entering the market are getting attached as features to an infrastructure that is fundamentally broken and an enforcement model that cannot operate in real time, says Matthew Moynahan, CEO at Forcepoint.
To transparently identify legitimate users in digital channels, organizations need strong digital identity risk assessment capabilities that examine each user's digital patterns and can more accurately detect potential bad actors, says IBM's Matt Konwiser.
Forty-eight percent of customers drop the products and services
of organizations that have had a publicly-disclosed data breach.
This is but one of the findings of the new 2018 Global State of
Online Digital Trust study commissioned by CA Technologies.
The new research study, developed by Frost and...
U.K. health and beauty retailer Superdrug Stores is warning customers that attackers may have compromised some of their personal information, apparently because they'd reused their credentials on other sites that were hacked. While Superdrug quickly notified victims, it stumbled in three notable ways.
Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst who will be a featured speaker at ISMG's Security Summit Aug. 14-15 in New York.
This edition of the ISMG Security Report includes an analysis by Executive Editor Matthew J. Schwartz on President Donald Trump's changing views on election meddling, plus an update on voter data being accidently exposed by a robocalling company.
At the advent of real-time payments, it's more critical than ever for organizations to quickly authenticate users and transactions. And David Vergara of OneSpan says emerging tools build upon legacy technologies to ensure trusted identity with minimal friction.
What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
As businesses evolve to support a complete digital experience, a challenge has emerged to one of the most basic questions of doing business: How can I truly trust I know my customer?
In the world of data breaches and identity theft, legacy programs of identity proofing and authentication do not instill a high level...
In the wake of Equifax and other major breaches, and armed with all of the personally identifiable information that they will ever need and a keen sense of the security controls that modern organizations use, sophisticated fraudsters are finding success as never before. At the center of it all is a new fraud trend:...
Business cases for fraud prevention technologies have typically been based on savings related to fraud management and compliance costs. While these factors may remain of interest, the impact on the customer experience and related operational costs must take precedence.
Download this white paper and learn how to...
The whole way we look at identity across the extended enterprise is in the midst of change. What is dynamic authentication, and how does it herald the future of digital identity?
Download this eBook on the future of digital identity and learn about:
The drivers toward dynamic authentication;
Despite the buzz about digital transformation, most enterprises remain overwhelmed by having to support and secure legacy technologies, says Mark Loveless of Duo Security. How can they simultaneously protect their legacy systems while securing their future?
Technology, regulations and customer expectations all have evolved, but what does this mean for how organizations secure identities?
This evolution has proven to be a two-sided coin, particularly for financial institutions. It's not only allowing financial institutions to offer new, innovative products where...