Cybercriminals have weaponized AI tools to easily bypass traditional security controls and create effective new attacks such as credential stuffing. That means it's time to shift to next gen cybersecurity, says Shuman Ghosemajumder of F5. And here are the technologies that will get you there.
An organization has successfully implemented a "zero trust" framework when it can achieve context-aware resolution of a risk, says Dr. Siva Sivasubramanian, CISO of SingTel Optus, an Australian telecommunications firm.
In the year of accelerated digital transformation, software development is undergoing transition - and so is application security testing. Matt Rose of Checkmarx offers tips to ensure you get the most out of automating your AST solutions.
Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic. Which poses the greatest threat and why? We asked this exclusive panel of CEOs and CISOs, and their responses might surprise you.
Over the course of the last decade, the nature of cybersecurity has changed, evolving past the idea of cybersecurity being a system of logical controls to fully prevent attackers from infiltrating systems, to becoming a data analytics problem based on behavioral analysis of attack patterns to detect them when they do....
Some payment card fraud detection systems that rely on artificial intelligence are now less effective because of changes in consumers' habits during the COVID-19 pandemic, says Rene Perez of Jack Henry & Associates, who offers insights on needed adjustments.
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.
Hospitals and other healthcare organizations can help prevent Medicare fraud by "having robust processes in place for employees to report fraud," says fraud mitigation expert Louis Rossignuolo, managing director of investigations at Altomonte Advisory Group.
Gartner has recognized Splunk as a Visionary in the Magic Quadrant for Application Performance Monitoring (APM). We believe this first-time placement in the research reflects the market-leading APM capabilities from Splunk, the Data-to-Everything Platform, including Splunk Enterprise, and Splunk IT Service...
Card-not-present fraud is rising as fraudsters inject malware into e-commerce websites to harvest account information, says Gord Jamieson of Visa. But the artificial intelligence models used to detect this fraud need to be refined to better mitigate this threat, he says.
Implementing an adaptive, risk-based authentication process for remote system access is proving effective as more staff members work from home during the COVID-19 pandemic, says Ant Allan, a vice president and analyst at Gartner.