Effectively fighting fraud has a lot to do with the speed of detection, investigation and countermeasure deployment. By integrating cognitive capabilities with fraud protection, it is possible to shift the balance of power and gain an upper hand in the battle against fraudsters.
Download this whitepaper and learn...
This eBook introduces IT professionals to next-generation multi-factor authentication (MFA), an approach to authentication that goes well beyond usernames and passwords to provide the right level of security assurance at the right time, anytime. But that's not all: Next-generation MFA also streamlines authentication...
An in-depth look at the DMARC anti-spoofing system - which the U.S. Department of Homeland Security this past week said it will require federal agencies to adopt - leads the latest edition of the ISMG Security Report. Also, continuous monitoring of the insider threat.
This monthly Security Agenda will highlight some of the most recent additions to our course library. September's edition features Ed Amoroso on the evolution of the role of a CISO. Other influencers like Hearst CISO David Hahn, First U.S. CISO, Gen. Gregory Touhill, Retired and Jennings Aske, CISO of New...
Enterprise intelligence combines human-led analysis and computer-driven analytics to provide actionable insights for your enterprise, so you can disrupt and neutralize threats.
Download this infographic and learn:
How often insider misuse is responsible for security incidents;
The average cost of a single data...
There's no denying that the proliferation of mobile devices presents new safety challenges for enterprises and consumers alike. But these potential challenges can be mitigated, paving the way for mobile to become a trusted, convenient and multipurpose enterprise digital ID.
Learn why mobile is the future of...
The recent online leak of an episode of HBO's Game of Thrones, which has been linked to four insiders at a company that handles data for Star India, has put the spotlight on strategies for mitigating insider threats.
True cybersecurity is about looking for what the new threats are and staying on top of those. And when it comes to fraud prevention, staying focused on the cybercriminal and the fraudster is what protects your customers and organisation.
Download this whitepaper and learn about:
The most prevalent fraud types and...
Banks often view innovation as coming at the cost of security. Instead, security can be an enabler to the digital transformation - helping banks welcome customers in and keep fraudulent activity out so they can pursue new growth opportunities, improve the customer experience, and build customer loyalty.
Download...
London-based health insurer Bupa Global is warning international policyholders that a breach affecting 547,000 customers - with data showing up on darknet marketplace AlphaBay for sale - traces to a now-former employee.
As the global threat landscape shifts, so does Kaspersky Lab. Moving from its traditional cybersecurity focus, Kaspersky now is honing in on fraud prevention. Emma Mohan-Satta describes this shift and what it means for security and anti-fraud leaders.
As the global threat landscape shifts, so does Kaspersky Lab. Whereas Kaspersky Lab traditionally has been known for its cutting-edge research on threat trends and malware evolution, now the focus is expanding to encompass the new types and vectors of fraud impacting enterprises, says Emma Mohan-Satta, a Fraud...
Sweden has ended a seven-year rape investigation against WikiLeaks founder Julian Assange. But it's far from the end of the legal troubles for the man whose spilling of secrets has shaped world politics.
Here are five cyber-related takeaways from FBI Director James Comey's testimony before the Senate Judiciary Committee, including his rationale on notifying Congress of his decision to reopen the probe of Hillary Clinton's use of a private email server and steps the bureau is taking to defend against the insider threat.
To keep up with compliance mandates like the PCI DSS, S&R pros largely employed SIM solutions as log management and reporting tools. With the surge of cyberthreats and the accompanying proliferation of security tools, legacy SIM solutions were forced to evolve to keep up with the volume.
Download this report to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.