Phishing, spearphishing, CEO Fraud/Business Email Compromise (BEC) and ransomware represent a group of critical security threats that virtually every organization will encounter at some point - and most already have. The logical evolution of phishing are increasing rapidly and costing organizations hundreds of...
Card issuers can view the merchants with whom a cardholder does business, the frequency of a cardholder's purchases, and the devices and IP addresses associated with that specific card. While this allows them to understand and assess certain patterns of behavior for individual cardholders, it restricts analysis to the...
When cardholder transaction and device data are disconnected, the potential for card issuers to more accurately detect and flag instances of fraud remains untapped. And as the connectivity of information in the real world continues to increase, so will related risks from fraudsters if issuers continue to rely solely...
Four years ago, Aetna Global Security hired a chief data scientist for security - a former NSA data scientist who did an outstanding job building over 100 models and a big data infrastructure dedicated to security. The purpose of hiring this data scientist: to take multiple sources of log files from newly deployed...
It's critical for entities to remember that major infrastructure cloud services providers have a very limited responsibility for their customers' data security, says Kevin Flynn of Skybox Security.
Attackers are increasingly hacking into banks' networks to gain access to the IT infrastructure connected to their ATMs, security experts warn. Attackers push malware onto ATMs that's designed to allow money mules to "jackpot" or "cash out" the machines, then delete itself.
It's the age of "open banking," and that means changes for banking institutions and their customers - as well as for the fraudsters. Shaked Vax of IBM Security Trusteer talks about new vulnerabilities and anti-fraud strategies.
A survey of more than 420 small, mid and large-sized enterprises to understand attitudes towards and progress along the Office 365 journey has provided an insight into customer adoption of cloud technology.
Download this infographic to learn the key findings:
Cloud migration in EMEA is further along than predicted...
Requirements for Compliance and e-discovery will vary based on the industry in which each organization operates. For example,
heavily regulated industries such as financial services, healthcare and government have very specific requirements that have to be
complied with, and the penalties for non compliance can be...
Researchers investigating the CCleaner malware outbreak have had a lucky break: The attackers' backup server shows that they pushed secondary malware onto systems at Intel, VMware, Fujitsu and Asus, among others, as part of what appears to be a very targeted attack campaign.
Aetna will move from passwords to continuous behavioral authentication next year on its consumer mobile and web applications for better security and end-user experience, says Jim Routh, the health insurer's CISO.
For the internet of things to become a business enabler in India, security considerations must be adequately addressed. So regulators have mandated that organizations take appropriate security steps.
All the key players of a company's management group, including the CISO, need to be involved in the decision about whether to invest in cyber insurance, says Greg Markell of Ridge Canada Cyber Solutions, a cyber insurer.
Freedom of Information requests sent to 430 U.K. local government councils by Barracuda Networks found that at least 27 percent of councils have suffered ransomware outbreaks. Thankfully, almost none have paid ransoms, and good backup practices appear widespread.
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. In it, respondents say their organizations continue to connect new and different types of endpoints, including point-of-sale (POS) devices, printers,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.