Delayed enforcement of the "strong customer authentication" requirements for online transactions under the European Union's PSD2 regulation is hampering efforts to enhance security. That's why the European Banking Authority should act quickly to develop a new timeline.
The Q4 2018 Notifiable Data Breaches (NDB) report documents
262 data breaches in organisations across Australia. For those in the
financial services sector it paints an alarming picture: The number
of breaches is steadily growing - and compromised credentials
are the leading cause.
According to the LastPass...
The cyber security landscape been marred with big name and large-scale breaches: Cash Converters, Australian Defence, and Facebook, to name a few. Naturally, we expected to see an improvement in password behavior in the two years.
However, LogMeIn's new research revealed just the opposite. Password behaviors remain...
Currently, nearly ninety percent of organizations worldwide are using
Active Directory (AD) for on-premises
resources (aka on-prem). That
represents 500 million organizations
and somewhere around 10 billion daily
authentications. In fact, in the world
of identity and access management
(IAM), AD has become...
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar...
Radio controllers used in the construction, mining and shipping industries are vulnerable to hackers, Trend Micro says in a new report. To address the issue, researchers say, manufacturers need to move away from proprietary communication protocols and embrace secure standards, such as Bluetooth Low Energy.
Enterprise use of artificial intelligence, including machine learning, is
taking off. Early adopters report widespread substantial benefits and
a few challenges.
Download this infographic to learn more about the top and bottom-line benefits from AI and ML.
Account takeover is a rapidly growing arena for
cybercriminals. How can organizations strengthen
both authentication and authorization?
Download this white paper to learn more about:
Why account takeover fraud is a growing and strengthening problem;
How organizations can strengthen authentication and...
The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to web infrastructure that you don't own or control, it becomes increasingly...
Email security in the era of the cloud is a critical concern for business leaders. This tool is a powerful way for businesses and services to communicate with their customers. From transaction notifications to billing statements to social media updates, email is a proven reliable and effective way for businesses to...
Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Expansive enterprise digital certificate and PKI usage, coupled with the advent of massive Internet of Things (IoT) device introductions, requires automation for secure and scalable...
One of the leading mobile-based financial services targeted at millennials approached Simility to help fight fraud. Simility provided an end-to-end solution which included customized models for their specific needs.
Fraudsters were using the company's customer accounts to funnel money via stolen identities. But...
Businesses across the UK and Europe spend billions each year on identity and access management, but almost all of this money is spent on protecting the digital identities of humans - usernames and passwords.
On the other hand, businesses spend almost nothing on protecting machine identities, even though our entire...
The definition of "machine" is undergoing radical change. The number and type of physical devices on enterprise networks has been rising rapidly throughout Europe and the UK, but this is outstripped by the number of applications and services they host.
At the same time, cloud adoption has spawned a tidal wave of...
You know that your organisation is using SSH to safeguard privileged access, but you may not realize that your SSH keys could be vulnerable to insider and cyber threats.
The majority of those we surveyed didn't. Results from a recent study show that most organisations don't have the SSH visibility or security...