Fraud and security teams have been converging for years, and now they have some common technology tools that can meet their unique and shared needs. How best can they manage convergence? Joe Nocera of PricewaterhouseCoopers offers insights in this video interview.
After a long career in the Secret Service, Steven Bullitt has joined Solutionary as its new vice president of cyber forensics and investigations. In this video interview, he explains the new perspective he brings to cybercrime defense and investigations.
A new report from researchers at RSA describes how cybercriminals are using social media, including Facebook, to not only network about their attacks, but also sell card data and other compromised consumer information. Daniel Cohen of RSA FraudAction describes the report in this video interview.
Just back from a trip to Israel, where she spoke with leading security researchers about such topics as the Internet of Things, cyberterrorism and banking malware, Gartner analyst Avivah Litan says 2016 will be a turning point for adoption of biometrics in identity proofing. Learn why in this video interview.
Avivah Litan, Art Coviello, Raj Samani. These are among the thought leaders who were to meet with ISMG's editors at the RSA Conference on Wednesday. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA preview.
From the moment the RSA Conference 2016 launched, speakers began debating the merits of the Apple/FBI case. Eminent cryptographers, NSA Director Mike Rogers and U.S. Attorney General Loretta E. Lynch all offered related opinions.
The impasse over whether Apple should help law enforcement open encrypted iPhones continued during a House hearing, as FBI Director James Comey and Apple's top lawyer, Bruce Sewell, didn't budge from their positions.
The "industrialization" of cybercrime, remote-access attacks and mobile-banking application and online-browser overlay attacks are trends the financial industry should monitor this year, says George Tubin of IBM Security Trusteer.
It's springtime in San Francisco: cue the annual RSA Conference. Here are some notable trends that have already emerged from the event, ranging from ransomware and phishing attacks to hacker self-promotion and Facebook fakery.
As the first day of RSA Conference 2016 sessions wrapped up, ISMG's editorial team sat down to discuss their takeaways from sessions and interviews. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA review.
As the first day of RSA Conference 2016 sessions was set to start, ISMG's editorial team sat down to discuss the event and what to expect from it. Editors Tom Field, Tracy Kitten and Mathew Schwartz offer an RSA preview in this video report.
A thriving market now exists to help cybercriminals recruit new talent, says Rick Holland of the threat intelligence firm Digital Shadows, which has been studying how cybercriminals advertise for new recruits - and the types of technology skills that are most in demand.
The cyberattacks that we've seen in the healthcare sector over the past year are starting to rewrite the rules for healthcare-related businesses in a way we really haven't seen before. How are you upping your game?
A federal magistrate in Brooklyn, N.Y., unlike another judge in California, has denied a request by federal authorities to force Apple to retrieve data from an iPhone, this time in a New York narcotics case.