Research by Dun & Bradstreet says business identity fraud jumped 254% last year. Tools can help prevent this fraud but may create greater friction, say Andrew La Marca, senior director at Dun & Bradstreet, and Ralph Gagliardi, agent in charge, High Tech Crimes Unit, Colorado Bureau of Investigation.
Enterprises spend a lot of time on what zero trust is, but too little time on design thinking - and why cybersecurity solutions need that element baked in from the start. Brian Barnier and Prachee Kale of ThinkDesignCyber and CyberTheory Institute give an overview of their zero trust strategy.
Cloudflare credits hardware multifactor authentication with preventing bad actors behind a targeted phishing campaign from gaining access to its internal systems. Although attackers siphoned employee credentials, the hard key authentication requirement stopped attackers from snatching a soft token.
Twilio, which runs a customer engagement platform used by thousands of businesses, says that its employees were tricked via SMS phishing messages into giving attackers their login credentials, resulting in the theft of information on customers, as well as their customers and end users.
The Twitter and YouTube accounts of the British Army were briefly taken over on Sunday evening by unidentified hackers who posted content related to cryptocurrency and NFTs. The situation has now been resolved, but the U.K. Ministry of Defense says the investigation is ongoing.
The need for more modern identity and access management capabilities such as biometric and passwordless authentication has been amplified by the COVID-19 pandemic and the shift to remote work, according to Forrester researchers Paul McKay and Merritt Maxim.
More than 80% of hacking breaches involve brute force or the use of lost or stolen credentials. Two- factor authentication
is the simplest, most effective way to make sure users really are who they say they are. By verifying your users’ identities before they access your network, two-factor authentication protects...
With the ongoing pandemic driving digital transformation and hybrid work, it's no surprise that the theme of this year's RSA Conference was "transform." Carrying forward that theme, RSA CEO Rohit Ghai says that channeling "disruptive forces at play" can be a powerful tool for driving needed changes.
The healthcare sector is still behind many other critical infrastructure sectors in implementing critically important security technologies to protect against the rise in potentially devastating cyber incidents, says threat intelligence analyst Christiaan Beek of security firm Trellix.
In response to the unprecedented software supply chain attacks to SolarWinds and Microsoft in 2020 and 2021, the United States Executive Branch issued a major directive on cybersecurity policy: the Executive Order on Improving the Nation’s Cybersecurity (EO 14028). The EO requires US federal agencies to adopt...
Trust is the currency of today’s digital economy. Businesses that earn and keep that trust, thrive – and those that don’t, struggle. With more than 5 billion users conducting their lives online, the opportunities for businesses to earn – and lose – trust are endless. In 2021, for the first time ever,...
In the latest "Proof of Concept," Lisa Sotto, Jeremy Grant and ISMG editors discuss the significance of Apple, Google and Microsoft supporting the FIDO protocol's passwordless sign-in standard, progress made on Biden's cybersecurity executive order and updates on U.S. cybersecurity and privacy laws.
A surprising improvement in loss ratios for cyber insurance providers in 2021 means the rapid rise in premiums might at last subside later this year. The loss ratio declined for the first time since 2018 despite the frequency and severity of claims filed for cyberattacks increasing again in 2021.
When acclaimed bank robber Willie Sutton was captured, a reporter inquired as to why he robbed banks. His simple answer was "because that's where the money is”. With advances in technology, it is plausible to “virtually” rob banks without involving weapons, but rather by a simple computer keystroke.
This...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.