Ransomware has evolved in two alarming paths: One to create distraction, the other to ensure destruction. Microsoft's Diana Kelley describes the new trends and how enterprises can respond.
Etay Maor has long been a force in cyber crime research. In his current role as CSO of Intsights, he has new views of breach trends, tools and techniques, as well as analysis of what's happening in fraud circles beyond the dark web.
No advanced hacking skills required: The burgeoning cybercrime-as-a-service economy continues to make it easy for aspiring cybercriminals to procure highly automated, easy-to-use and effective attack tools to fuel illicit profits, says Liv Rowley, a threat intelligence analyst at Blueliv.
Russia, China, North Korea, Iran - the major nation-state actors are well known to cybersecurity leaders. But how do their motivations and tactics differ? Sanjay Virmani of San Francisco's FBI office shares insight on the nation-state threat.
Elvis Chan is one of the FBI's foremost experts on election cybersecurity. And as the US marches toward the November presidential election, he is laser-focused on protecting the vote from foreign influence.
The latest edition of the ISMG Security Report discusses the developing definition of "Insider Risk." Plus, Former DHS Secretary Michael Chertoff on U.S. 5G rollout plans; Cloud Security Alliance on containers and microservices.
RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over COVID-19 also dominated.
A key disconnect exists between awareness of financial services fraud schemes and mitigation, according to the latest "Faces of Fraud" survey sponsored by Appgate. Mike Lopez, vice president at the firm, describes some key findings.
Enterprises have such product sprawl in their security stacks today, it's hard to establish - much less maintain - any degree of visibility. Joe Partlow of ReliaQuest discusses how to improve visibility, as well as how to train security teams via simulated attacks.
What is Big Game Hunting in the cybercrime context, and how are industry sectors being targeted? Jennifer Ayers of CrowdStrike shares insights on this and other trends detailed in 2020 Global Threat Report.
The Cryptographer's Panel, which sees five cryptography experts analyze and debate top trends, remains a highlight of the annual RSA conference. For 2020, the panel focused on such topics as facial recognition, election integrity and the never-ending crypto wars, while giving shout-outs to bitcoin and blockchain.
Just as consumers can look at a box of Twinkies and read a list of ingredients, so too should software makers provide users with a "bill of materials" explaining their composition, says Allan Friedman, director of cybersecurity initiatives at the U.S. National Telecommunications and Information Administration.
Moving from EDR to XDR creates new visibility gaps for organizations, says Sameer Malhotra of TrueFort, who explains a new approach to application threat detection and response.
Two Chinese nationals have been indicted by the U.S. Justice Department for allegedly laundering $100 million in cryptocurrency stolen by North Korean hackers in 2018.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.