The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized businesses should not breathe any sighs of relief. They are very much still targets, says Austin Murphy of CrowdStrike. He offers cybersecurity advice to SMBs.
Download this thought-leadership whitepaper...
Technology, regulations and customer expectations all have evolved. What does this mean for how organizations secure identities? Baber Amin of the Office of the CTO of Ping Identity offers strategic insight.
The Secure Payments Task Force was established by the Federal Reserve Bank in 2015 in part to determine areas of focus and priorities for future action. Jim Cunha, a member of that task force, talks discusses how to advance payment system safety, fight fraud and ensure resiliency.
According to a recent report, The Identity Fraud Study, released by Javelin Strategy & Research, it showed in 2015, there were more than 1.5 million new account fraud victims that accounted for losses of $2.8 billion. This number increased by 40% in 2016, and there is no reason to believe that this trend is stopping...
Many banking institutions boast of being "digital first" and enabling "omnichannel banking." But are they fully aware of the new fraud risks they also are inviting? This whitepaper takes a deep dive into discussing how to mitigate omnichannel fraud and why it is not just a banking issue. There is a need for...
Not only does the financial industry need to protect data that is easy to monetize, but investment banks and other noncommercial entities are also charged with safeguarding information surrounding investment strategies, mergers and acquisitions, and market influencers that would be sought after by actors motivated by...
Developing nations that are moving to digital payments, especially for the unbanked, need to keep in mind security lessons already learned in other markets, including Europe, says Steve Marshall, founder at Risk-X, a U.K.-based audit and risk assessment consulting firm.
Financial institutions are increasingly moving to online and mobile channels to offer better and more cost-efficient experiences to their customers. But how can your bank overcome security concerns? Unfortunately, digital channels have become a high-risk environment due to data breaches, phishing, malware, and social...
The Cyber Kill Chain model describes how attackers use a common cycle of methods to compromise an organization. IT security leaders can use this research to align security programs to adversaries and improve their ability to predict, prevent, detect and respond to threats.
Download this Gartner Report in which...
Many banking institutions boast of being "digital first" and enabling "omnichannel banking." But are they fully aware of the new fraud risks they also are inviting? Kimberly Sutherland and Kimberly White of LexisNexis Risk Solutions discuss how to mitigate omnichannel fraud.
As banking institutions of all sizes maximize their digital channels, there is growing tension between the need to prevent fraud and the desire to maintain a frictionless customer experience. IBM Trusteer's Valerie Bradford discusses how to defuse this tension.
The black market for cybercrime is worth more than $2 trillion, and more than half of companies have been hit with successful attacks. No matter the crime, the threat of punishment historically has not deterred criminals. So what does? You must change the economic equation. If they can't make money, they don't do the...
Today, application infrastructure is divided between on-premises data centers, clouds, and distributed applications that leverage microservices. To keep everything safe, organizations need a unified solution that offers visibility and control - and perimeter-centric network security can't provide that.
Download...
The adoption of e- and m-commerce has created new opportunities for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions.
However, preventing fraudulent transactions with fewer instances of false positives is possible by leveraging shared transaction data from a consortium of...
An investment firm needed a managed endpoint detection and response solution that could integrate into its existing security program, which already included two managed providers.
Download this case study to learn how the firm was able to:
Seamlessly integrate their new solution alongside other managed...