Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by bad actors? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your...
In late Q4 2023, ISMG conducted a survey that attracted over 100 responses from professionals and provided a unique platform for Fraud, AML, Financial Crime, and Compliance leaders to contribute their insights and to offer a deeper understanding of how AI is shaping the daily battle against fraud.
The continuing battle against fraud and financial crime demands constant adaptation and innovation. Generative AI - Artificial Intelligence - and broader AI technologies have brought both excitement and apprehension to our field, as they hold the promise of revolutionising our approach to fraud prevention while...
Our email authentication experts will be on hand to provide their insight and a demonstration of how exactly Proofpoint Email Fraud Defense can help identify and close requirement gaps.
A recently spotted hacking group with a penchant for using open-source tools has been using a less-than-novel tactic: exploiting SQL injection flaws. So warn researchers who recently detected attacks by the group, which has the codename GambleForce and appears to focus on gambling and retail firms.
In the latest weekly update, the former federal CISO, Grant Schneider, joins three editors at ISMG to discuss important cybersecurity issues, including advice for the next White House cyber director and liability concerns facing CISOs following SolarWinds and its CISO being accused of fraud.
Banking institutions have more data and analytics than ever before. But how are they using them to drive better risk and fraud decisions? Diana Rothfuss and Terisa Roberts of SAS open up on enterprise decisioning - linking people, data and processes faster and more efficiently.
In recent years, the adoption of public cloud infrastructures has surged, providing organizations with unparalleled flexibility and scalability. But this shift has also introduced a new set of challenges when it comes to protecting web applications and APIs that are hosted on these platforms.
The advent of generative AI has transformed the way modern organizations operate. While many business users are adopting tools like ChatGPT and Google Bard to enhance productivity, cybercriminals are also capitalizing on this technology—resulting in more attacks with increased sophistication.
To understand how...
Email is a major entry point for threat actors, who have evolved their tactics to bypass traditional security solutions and now leverage AI to make attacks more scalable and harder to detect. In response, organizations are buying AI-enabled solutions to bolster their security posture. This survey shows...
In the aftermath of the pandemic and global political unrest, the risks
of identity and credential theft have surged, and a deluge of scams are
exploiting the crisis. Consumers facing disrupted incomes seek credit
solutions, and fraudsters seek to exploit them by using application
fraud tactics.
In this eBook,...
Vice President at Appgate, Mike Lopez, offers his expert analysis on the survey findings and how this year's results were unique to the most current cyber threats.
Welcome to our report summarizing the 2023 Faces of Fraud survey. We are most grateful to our 150+ industry contributors who answered our questions frankly to enable us to provide a snapshot of the frauds causing most concern for financial services in 2023.
The data shared in this report, as well as expert...
Applications are, without a doubt, at the heart of all business activities. Secure and highly available applications power your business and the world.
But keeping them secure and building and deploying them in the cloud at low cost has never been more challenging.
Join us at the Akamai World Tour in Tokyo to...
Application journeys are fluid in practice because applications can live anywhere. Complex deployments with too many tools to configure and manage and overwhelmed IT teams lead to mistakes, so organizations should take a cybersecurity mesh platform approach to securing their application journeys.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.