Earlier this month, we saw the disclosure of a report showing how a security researcher was able to successfully infiltrate 35+ name brand companies,
primarily via npm. Ironically, the mechanism used to perpetrate the attack, what’s being called namespace confusion or dependency confusion, is one that has been at...
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
F-Secure Cloud Protection for Salesforce
As organizations of all sizes, across different industries, increasingly embrace cloud services, attackers are switching their focus to exploit vulnerabilities in commonly used services. As a result, a growing number of businesses are suffering serious consequences such as...
Since SEGs are missing so many phish, there’s a good chance other technologies - firewalls, anti-virus, and EDR - also aren’t spotting these threats. Such gaps can leave you vulnerable for hours or even days.
Bottom line: you can’t rely on SEGs alone. They’re the first line of defense, not the last...
Why are polymorphic attacks more successful? A campaign that lacks uniformity doesn’t look like a campaign and makes it difficult for security operators to keep rules up to date at the gateway. For many cybersecurity teams who lack bandwidth, finding the full scope of a polymorphic attack to quarantine is...
With a pandemic sweeping the world, countless businesses have had to move online to cope. This sudden surge in new online commerce has also led to a rise in cyber attacks, particularly through credit card fraud.
Download 'The State of Credit Card Fraud 2021' ebook and find out how you can protect your business from...
As the world comes to terms with the new normal, financial services and insurance firms must learn to balance good CX with proper fraud detection.
Download this study and read about how:
Firms have seen a 42% increase in year-over-year call volume because of the pandemic
83% of firms rely on contact center agents...
Interactive voice response (IVR) systems are now hubs for both customer care and associated fraud. This document describes how an end-to-end approach that spans time, channels and multiple data sources can detect activity by fraudsters and prevent their efforts to mine personal data and, ultimately take over...
IT strategies in the digital era are undergoing a transformation to become an integral part of enterprise digital business strategy. No longer an insular exercise by the CIO, senior management, LOB executives and CIOs work together to create and co-own new IT strategies. CIOs need an inclusive, agile and systematic...
Our experts weigh in: How will we secure an all-digital, remote world?
COVID-19, remote work, and warp-speed digital transformation mean that security teams face more challenges than ever. We’ve got thoughts on beating the bad guys in 2021:
Download this guide to learn more about:
Supply Chain Attacks: Mind...
It’s clear that in cyberspace individual companies are struggling to keep up against
the growing volume and sophistication of attacks, despite increasing investments.
There are no easy answers to cybersecurity, but we do know that a Collective Defense
strategy — where companies, sectors, states, and nations...
As existential threats present challenges that are much greater
than any single company or organization can manage alone,
the time is now to defend together… or get left behind.
Working with leading companies across sectors, we have
identified their shared cybersecurity pain points — and ways
we are solving...
The volume of data stored on the public cloud is growing exponentially. With this growth, the challenges of data protection, regulatory compliance, and the risk of data breaches grow just as rapidly. At the same time, privacy regulations are becoming more common around the world. With each regulation possessing its...
Implementing a Risk-Based Vulnerability Management Solution is easier than you think. And, once you evolve to this proactive, strategic methodology, you can immediately begin reaping the benefits of a VM program that delivers the dynamic, continuous visibility you need to proactively manage risk and make strategic...
In the era of digital-led growth, executives are looking to cybersecurity leaders for guidance in driving key business strategies. Yet, a communication gap persists between the worlds of business and security. Just four in ten security leaders are able to confidently answer the question, "How secure, or at risk, are...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.