Social media platforms have emerged as the world's most popular forms of communication. They also have become popular platforms for committing fraud. David Pollino of Bank of the West outlines what institutions should do to secure their social media presence.
Recognizing that social media create fertile grounds for fraud, the American Bankers Association now shares advice for how institutions can use these channels in ways that are compliant, smart and risk-savvy. The ABA's Denyette DePierro offers some tips.
Developing a mature threat hunting capability requires experienced incident response leadership as well as good relationships with law enforcement, says attorney Michael Zweiback.
Data science is playing a fundamental role in a more dynamic approach to cybersecurity, says Jim Routh, CISO of Aetna, who stresses the importance of applying machine learning to front-line data security controls. Routh will be a featured speaker at the ISMG Security Summit in New York Aug. 14-15.
A move to a "more autonomous" security operations center is helping Encompass Health cope with a shortage of skilled cybersecurity workers while improving its response to cyber threats, says Mitch Thomas, chief security officer.
Banks need to improve customer identity verification by bolting on new tools, such as device reputation assessment and behavioral analytics, says Al Pascual of Javelin Strategy & Research.
This edition of the ISMG Security Report features Elvis Chan, a supervisory special agent at the FBI, discussing ongoing efforts to thwart Russian interference in the U.S. midterm election this fall, and Alberto Yepez of ForgePoint Capital addressing cryptocurrency security issues.
Most cybersecurity tools are designed to help identify, alert on, and in some cases prevent a particular type of malicious activity. Current technologies send alerts and may even prevent specific types of attacks, but the burden remains with the organization to figure out whether that alert is meaningful in a broader...
Hunting for an unknown threat or investigating an alert or breach can prove challenging and time-consuming for anyone - whether that's a dedicated analyst or a person that plays multiple roles. While having visibility across data silos is a great starting point, detecting and addressing threats over the long term...
We are amid a data explosion that has created unique challenges and opportunities for organizations across industries. Mountains of machine data from disparate systems can make it difficult, costly and time intensive to manage and secure IT assets. But with the right solutions, organizations can reduce costs, optimize...
The traditional way of detecting an advanced malware or threat compromise in a Windows environment using an anti-virus or malware product can be difficult. Learn how the Splunk platform can simplify the process and protect your organization against advanced threats.
Download this report to learn more about:
How to...
Facebook has promised to bring machine learning to bear on the problem of hate speech and information warfare via its platform. But insiders have been urging the company to pursue a major cultural change, including prioritizing not doing anything "creepy" over the quest for short-term gain.
Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst who will be a featured speaker at ISMG's Security Summit Aug. 14-15 in New York.
At Infosecurity Europe 2018, Information Security Media Group conducted dozens of video interviews with industry thought leaders. Here are the highlights.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.