Business email compromise and account takeover attacks haven't faded; they've just morphed. Wes Dobry of Agari discusses the new wave of these attacks and how organizations can do a better job of detecting and responding to them.
Jan Koum, WhatsApp's co-founder, is leaving Facebook. His departure marks another exit of a high-level privacy and security advocate. If Facebook continues to lose those who could better influence the social networking site's worrying views toward user data, what does that mean for the rest of us?
The head of the NSA's Cybersecurity Threat Operations Center says attackers haven't bothered targeting unclassified U.S. Defense Department networks with a zero-day exploit in 24 months. Instead, they attempt to exploit flaws within 24 hours of information of the vulnerability or exploit going public.
In today's dynamic healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. As attackers become more sophisticated, and as IT innovation continues to pick up pace, the escalation of cyber risk can easily overwhelm organizations with limited resources.
Download this...
Today's reality is that attackers are always present. Deception technology is purpose-built to stop advanced attacks and align security operations to top business risks.
In this white paper, we offer three examples of how financial services organizations are leveraging deception technology to get ahead of advanced...
The most costly attacks on ATMs are likely to be executed through the bank's corporate network. Although from inside the network, attackers cannot execute financial transactions on the ATM machines themselves, they can potentially gain access to the entire network of ATMs, as well as the related patch management...
Every day your organization's employees help cyber-attackers - not intentionally, but because the ordinary activity of sharing data and accessing corporate resources creates an "access footprint" that attackers can use to move toward your critical systems.
Download this whitepaper to learn more about:
A quick...
Old authentication processes cost you customers, efficiency and branch profits. Give your customers an omni-channel experience with instant and secure online authentication via a computer or mobile device. Gain their trust and confidence while you protect them against fraud.
Read this fact-based ebook to learn how...
Have you heard the statistics supporting the fact that every enterprise - from airlines and appliance manufacturers to banks and hospitals - needs to make a digital transformation? By 2020, 72% of the world's employees will be mobile workers, more than 20B devices will be connected to the internet of things and we'll...
Ovum, a market-leading research and consulting business that helps enterprises thrive in the connected digital economy, explains why every enterprise should put stronger authentication service on their radar as a means of better securing their companies data and minimizing their fraud exposure risk all while...
You can build a tall castle with fortified walls, but what good are the defenses if you leave the drawbridge open?
Recent breaches such as Equifax and Panera Bread have shown how basic vulnerabilities to application framework and web service code can lead to embarrassing headlines and crises of confidence.
At...
Accidentally careless employees are the biggest cause of incidents involving data loss, responsible for almost 25 percent of all breaches.
Given that employees are the first line of defense against socially engineered schemes, such as account takeover, new account fraud and other crimes, doesn't it make sense to...
Despite increasing investment in cyber security tools for the data center, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat: accidental loss, misdirected content and the malicious insider. These types of incidents contribute up to 80% of all breached...
Twitter is now caught up in the Cambridge Analytica scandal: The social network sold public Twitter data to Aleksandr Kogan, the same person who sold Facebook data to Cambridge Analytica. Twitter says Kogan obtained no private information on users.
As the head of DevSecOps at Intuit, Shannon Lietz tracks the real-world tactics, techniques and procedures hackers use against her organization. She's cataloged the top 10 application security attack techniques being used against Intuit, which differ markedly from the OWASP top 10.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.