Criminal hackers don't break for lunches, weekends or holidays. Of course, that's just one of many challenges facing information security teams, as they attempt to maximize visibility and minimize complexity while protecting their business around the clock, says Peter Van Lierde, the CISO of energy firm Sibelga.
Some 14,000 Google users were warned of being suspected targets of Russian government-backed threat actors on Thursday. The next day, the tech giant announced cybersecurity updates - particularly for email accounts of high-profile users, including politicians and journalists.
This case study is based on interviews with executives responsible for contact center customer service and fraud prevention in two Top 20 U.S. Banks concerning the contact center challenges they faced and the needs that led them to look for a new technology solution.
Download this case study to learn how two Top 20...
The STIR/SHAKEN (S/S) framework allows voice service providers to authenticate that the caller ID information transmitted with a particular call matches the caller’s number. Upon widespread implementation, the hope is that S/S will help reduce illegal spoofing, allow law enforcement to identify bad actors more...
It's boom times for high-growth enterprises. But the same can be said for cybercriminal adversaries looking for cracks in your cybersecurity armor. How can you leverage your security controls and data to build an effective and mature 24/7 threat detection and response capability, that also helps ensure...
The payments ecosystem is complicated, and many players are involved in the transaction process. Other actors may come into play as well, which only increases the number of touch points for a transaction. The ecosystem needs a new way of attacking fraud. Moving fraud detection earlier in the process, and from the...
Team Cymru commissioned Forrester Consulting to quantify the positive financial impact of external threat hunting using Team Cymru’s Pure Signal™ Recon solution. Supply chain risk is top of mind for most organizations. The company in this study applied external threat hunting to this challenge and is now able to...
Team Cymru commissioned Forrester Consulting to quantify the positive financial impact of external threat hunting using Team Cymru’s Pure Signal™ Recon solution. Supply chain risk is top of mind for most organizations. The company in this study applied external threat hunting to this challenge and is now able to...
Ransomware continues to dominate headlines with no sign of slowing down.
What started more than 30 years ago has become one of the most prevalent and lucrative cyberattacks, with 20% of ransomware attacks damaging reputations beyond repair. As this continuously growing problem continues to threaten organizations...
Financial institutions across the country executed quick pivots to allow operations to continue during this unprecedented time. This abrupt shift to remote work and virtual processes served to accelerate technology adoption among employees and customers, from digital banking solutions to collaborative communication...
The disruption of the pandemic along with the anywhere workforce resulted in a surge of sophisticated cyberattacks and material breaches. 78% of Canadian cybersecurity professionals said attacks increased due to employees working remotely.
Security teams now face the challenge of securing the anywhere workforce....
The cybersecurity firm IronNet, founded and led by retired Army Gen. Keith Alexander, has gone public without an IPO by merging with LGL Systems Acquisitions Corp., a "blank check" shell company formed to handle such mergers. Meanwhile, Checkpoint has announced plans to acquire the email security firm Avanan.
The healthcare sector has been reshaped by the forces of digital transformation and virtual health. But it also has been besieged by the shifting threat landscape and the escalation of destructive ransomware attacks. What role can zero trust play? Jack Miller of Menlo Security shares insight.
A vulnerability in Microsoft Azure's database service Cosmos DB has potentially put at risk thousands of Azure customers, including many Fortune 500 companies, according to the security firm Wiz. Microsoft has mitigated the flaw.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.