Brokerage account takeover, supply chain attacks, destructive attacks and those that seek to manipulate time or time stamps are among the latest threats uncovered in the new Modern Bank Heists report authored by Tom Kellermann at VMware Carbon Black.
Adopting the "zero trust" model is essential to ensuring security as organizations use more IoT devices, says Fred Streefland of Hikvision, a Chinese company that manufactures video surveillance equipment. He addresses misconceptions about the model.
How can automation help to reduce money laundering fraud? Larry Gordon and Kathleen Gowin of the consultancy Endurance Advisory Partners describe how predictive KYC can help mitigate risks.
Four editors at Information Security Media Group discuss important cybersecurity issues, including President Biden’s latest cybersecurity proposals and large vendor-related breaches in healthcare.
Today's cryptocurrencies are based on cryptographic standards that eventually could be broken via quantum computing, says Gideon Samid of BitMint, which has developed a virtual currency based instead on the concept of "quantum randomness."
Exponentially more devices on the network mean proportionately less visibility. This is reality for most enterprises today, and it’s changed the role of endpoint security solutions. Elias Levy of Cisco discusses emerging technologies and strategies, including the rise of XDR.
Less than a year ago, Ariel Weintraub was dabbling in data science as head of security operations and engineering at MassMutual, working under CISO Jim Routh. Now she’s replaced Routh as the new head of enterprise cybersecurity - and she welcomes the challenge.
To deliver a secure infrastructure-as-code service, development teams must adopt a shift left strategy to bring all the applications and security under one umbrella to provide faster and continuous delivery of the fully automated code, according to Ori Bendet and Igor Markov of Checkmarx.
Many governments are exploring Central Bank Digital Currencies to reduce costs and expand digital inclusion. Karen Hsu of AppDome discusses the opportunities and challenges for minting digital money.
Synthetic identity fraud is a pervasive yet ill-defined crime – hard to define as well as to detect. Greg Woolf of FiVerity discusses a recent initiative by the Federal Reserve in Boston to better define and therefore better manage SIF.
Four editors at Information Security Media Group discuss important cybersecurity issues, including dealing with attacks targeting the aging Accellion File Transfer appliance and taking steps to enhance employee authentication.
Pharmaceutical companies can leverage data analytics, predictive analytics and artificial intelligence to fight drug diversion fraud, says Charles Washington, senior director, global fraud and asset protection, at Pfizer.
Banks and mobile network operators should collaborate to mitigate the risks of SIM swap fraud, which can lead to account takeovers, says Clare Messenger, global head of fraud protection at the U.K. telecom firm JT Group Ltd.
The "zero trust" model is outdated in today's cloud environment, says Ian Thornton-Trump, CISO at Cyjax, a threat intelligence company, who recommends the use of segmentation and monitoring for anomalous behavior instead.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.