The COVID-19 pandemic has shifted the dynamic of card fraud in favor of the fraudsters due to the massive increase of online transactions, says Andrei Barysevich of the fraud intelligence company Gemini Advisory. And many fraudsters are using more sophisticated tools, including anti-fingerprinting technology.
William Dixon of the World Economic Forum is calling for the formation of a "quantum computing security coalition" to help build trust in the technology, which could play a key role in enhancing security.
In an in-depth interview, Denyette DePierro of the American Bankers Association provides an overview of emerging regulatory issues, cloud security challenges and the use of social media apps for payments.
With colder weather, the flu season and the holidays ahead, the northern hemisphere is at risk of another major COVID-19 outbreak. Pandemic expert Regina Phelps says it's time to change behavior, and that starts here: "Live like you're contagious."
It might be new, but are we ready to call this "normal?" In this latest in a series of CEO/CISO panels, cybersecurity leaders talk frankly about the new risk surface and the role emerging technologies play in helping us keep pace with our adversaries.
The key element for a successful fraud fusion center in banking is for fraud and security teams to work together using a simple methodology to prevent, detect and resolve fraud, says technology adviser Ben Wallach, the former executive vice president and chief fraud director at BB&T, a U.S. bank holding company.
As small businesses apply for loan forgiveness under the Paycheck Protection Program, and banks who made the loans on behalf of the Small Business Association investigate whether any were fraudulently obtained, fraud-detection technologies will play a critical role, says Frank Mckenna of Point Predictive.
New Zealand's stock exchange, NZX, recently fell under a massive distributed denial-of-service attack that was part of an extortion attempt. Security specialist Daniel Ayers breaks down what went wrong and how other organizations can avoid similar issues.
Independent bug hunters who find flaws in products and services often struggle to hand off their vulnerability report to someone in a position to get it fixed, says longtime security researcher Daniel Cuthbert. He describes steps organizations must take to be able to receive - and act on - bug reports.
Consumers hate passwords, criminals love them. And while the journey to passwordless authentication takes time, there are lessons to be learned from major global organizations who have started down the path. Dr. Rolf Lindemann of Nok Nok Labs shares insights.
Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic. Which poses the greatest threat and why? We asked this exclusive panel of CEOs and CISOs, and their responses might surprise you.
When startups succeed, they typically hire more employees to handle increasingly specialized tasks. The same goes for ransomware gangs, which, as they grow, have been hiring experts with advanced hacking, encryption, negotiation and other skills to help take down larger targets, says Coveware's Bill Siegel.