Vice President at Appgate, Mike Lopez, offers his expert analysis on the survey findings and how this year's results were unique to the most current cyber threats.
Welcome to our report summarizing the 2023 Faces of Fraud survey. We are most grateful to our 150+ industry contributors who answered our questions frankly to enable us to provide a snapshot of the frauds causing most concern for financial services in 2023.
The data shared in this report, as well as expert...
FICO research has found that macroeconomic factors can significantly impact fraud trends, and with inflation and fears of a recession looming, banks are facing new threats from fraudsters whose methods are becoming significantly more sophisticated. One of the areas most impacted is first-party fraud, where fraudsters...
FICO released the results of a survey of 1,000 Canadian consumers who were asked to share their perspectives about how financial services organizations manage fraud and identity verification in a digital-first world. These survey results provide insights on:
How your fraud efforts could be your secret weapon in...
FICO released the results of a survey of 1,000 American consumers who were asked to share their perspectives about how financial services organizations manage fraud and identity verification in a digital-first world.
These survey results provide insights on:
How your fraud efforts could be your secret weapon in...
An evolution in transaction monitoring is required to accurately detect suspicious activity and truly reduce false positives.
This comprehensive guide helps you quickly assess your program’s current state and identify opportunities for improvement. By updating processes, implementing the right tech, and closing...
Performing penetration testing on Amazon Web Services (AWS) requires a specific skillset and detailed knowledge of AWS architecture. With AWS accounting for 41.5% of the public cloud market, which is larger than Microsoft, Google, Rackspace, and IBM combined, where do you start? What do you focus on? How do you...
Companies are increasingly concerned about the security of applications built on open source components, especially when they’re involved in mergers and acquisitions. Just like copyright for works of art, each piece of open source software has a license that states legally binding conditions for its use. Licenses...
The ongoing rise in open source vulnerabilities and software supply chain attacks poses a growing threat to businesses, which heavily rely on applications for success. Between 70 and 90 percent of organizations’ code base is open source, while vulnerabilities such as Log4j have significantly exposed organizations...
Application journeys are fluid in practice because applications can live anywhere. Complex deployments with too many tools to configure and manage and overwhelmed IT teams lead to mistakes, so organizations should take a cybersecurity mesh platform approach to securing their application journeys.
Cybercriminals continue to rely on proven attack methods while developing new ways to infiltrate digital environments and break through your human defense layer.
But how can you reduce your organization’s attack surface? We looked at 12.5 million users across 35,681 organizations to find out.
In this webinar...
Thales has agreed to purchase Imperva for $3.6 billion to enter the application and API security market and expand its footprint in data security. The deal will add a robust web application firewall along with capabilities in API protection and data discovery and classification to Thales' portfolio.
Traditional licensing models that lock organizations into fixed solutions or time periods are no longer ideal. Organizations need to consider usage-based licensing approaches that offer flexibility to deploy whatever solutions are required, wherever they are needed, for whatever length of time.
Organizations today are investing in modernizing their IT infrastructures in the data center and the public cloud for their digital acceleration initiatives. For many, their strategy to drive better business outcomes hinges on building and operating applications that provide a better experience for their customers and...
Digital acceleration is a constantly evolving process of transformation as organizations strive to modernize application and cloud journeys to meet the needs of their customers or organizations today and tomorrow. Organizations must also accept that their deployment, consumption, and security requirements will evolve...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.