Digital transformation we all have experienced over the last few years, everything online is at risk of fraud – fraudsters will try to take advantage over customer digital footprint at any time and access point. Telesign's Seth Gilpin shares insights.
Cloud email security: It involves new strategies and tools to defend against a new wave of attacks. Arun Singh of Abnormal Security discusses the latest flavor of email attacks and the new Knowledge Bases created to help enterprises increase their education and defensive capabilities.
For many brands, especially large enterprises with a substantial online presence, it is important to be able to have eyes all over the internet in order to properly mitigate the effects of external elements on their brand’s reputation.
The email attack vector. It may not earn much discussion, but the adversaries take full advantage of it with phishing, BEC and now email platform attacks. Mike Britton, CISO of Abnormal Security, talks about the latest threat trends and how to detect and defend against them.
Microsoft 365 offers tiers of security features, but their email security capabilities may not be as robust as their popularity. Your organization sends thousands of emails every day, and email can be one of the most vulnerable methods for attacks. Phishing, malware, ransomware, stolen credentials, and more can all be...
What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords with ease? And what can/should you do to improve your organization’s authentication methods?
Password complexity, length, and rotation requirements are the bane of IT...
Application fraud has spiked - particularly bogus new accounts - and organizations are scrambling to improve fraud detection mechanisms without negatively affecting the legitimate customer's experience. Robin Love of Early Warning shares insights on how to better predict new account risk.
Most businesses say that preventing fraud is their top concern—the highest point that figure has ever been. The worry is understandable given that fraud increased by 70% in 2021 to more than $5.8 billion.
There is a growing expectation to secure themselves that businesses recognize as well as to protect consumers...
Since the pandemic began, 55% of consumers have higher expectations for their digital experience. It’s clear that the digital experience is paramount.
Users — from individual consumers to various small businesses — expect the ability to interact with just about every service online these days. Failure to...
Synthetic Identities, also known as SIDs are then used by cybercriminals to defraud various types of organizations. Fraudsters use these identities to apply for credit accounts, and the identity is then reported to credit reporting agencies, creating a new record associated with the fraudulent information.
In...
Security firm Group-IB has identified 34 hacking groups that are now selling a stealer-as-a-service model to spread infostealer malware and steal credentials from online gaming and payment accounts. The company advises organizations to be on the lookout for Raccoon and Redline infostealers.
Mega-breaches and ransomware attacks are every day news. Yet, far too many enterprises operate as if just back-ups and cyber insurance will see them through. Mark Sangster of Adlumin weighs in on detection, response and how to demonstrate duty of defense.
Successful account takeovers are one of the most common ways that organizations end up with attackers in their systems. But strong authentication can thwart even the most clever phishing campaigns, says Brett Winterford, regional chief security officer for APJ at Okta.
Banks are getting better at catching a wide range of scams targeted at customer accounts, but they are still struggling with stopping authorized payment fraud through peer-to-peer payment companies such as Zelle, says David Pollino, former divisional CISO with PNC Bank.
On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch. Hugh Brooks of CertiK shares the status of data that FTX stores, the role of regulations and best cybersecurity practices for crypto exchanges.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.