Pete Barker was a cybersecurity Digital Loss Prevention practitioner before joining SpyCloud as Director of Fraud & Identity. He saw first-hand the impact of COVID-19 on fraud incidents, which are more automated and broadly targeted. He explains how "COVID changed all the rules" and how defenders can raise their game.
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Your secure email gateway (SEG) never stood a chance. Socially-engineered attacks are the largest security threat, and with the rise of modern attacks like supply chain compromise, executive impersonation, and account takeover, it’s become obvious that the SEG no longer works. These traditional solutions simply...
Older consumers are considered a more vulnerable population. They are the best kind of customers, and cybercriminals know that. They are known for having better credit and more funds, tend to be more trusting, and lack familiarity with new digital technologies. Fortunately, there is a way to help financial...
Complex IT ecosystems coupled with fragile security protocols leave companies vulnerable to security attacks. As companies move towards Zero Trust, microsegmentation solutions help protect against unknown exposures on the network. Organizations are continuously responding to changes in the cybersecurity landscape and...
Organizations are forced to prioritize security efforts. This leads to risky tradeoffs, like only focusing on part of the attack surface. And a lot of organizations have adopted security models such as shifting left, at the risk of having an incomplete strategy. Efforts to staff up, prioritize resources, and situate...
Fraudsters are having a field day as the pandemic persists, with experts warning that scams targeting consumers and businesses remain at record-high levels. To combat such attacks, experts say financial services firms need to bolster their identity controls with tools to more accurately track and counter scams
We thought it was bad enough when traditional ransomware started to steal data in its second generation of evolution, now dubbed "double extortion". The third stage of ransomware is beginning to happen now and will make us wish for the good, old days of Ransomware 2.0.
Attend this presentation to learn how...
APIs are everywhere in the modern IT world, and the volume of API traffic is
only expected to grow. However, despite the power and popularity of APIs, many
organizations struggle with API security.
When it comes to securing APIs, traditional web application security controls alone don’t
provide a complete...
Alissa Knight, former hacker, current CISO and researcher, unveils API vulnerabilities across the industry by hacking 55 apps throughout banks, neobanks, and cryptocurrency exchanges.
This API security white paper explores those vulnerabilities and the discovery process. Download the whitepaper to learn more.
A California man has pleaded guilty to his role in a scheme to commit a $50 million wire and securities fraud that involved the creation of fake websites to solicit funds from investors, the Department of Justice announced Wednesday.
F5 Shape Security provides real-time monitoring & intelligence that protects firms from both human and bot-driven fraud before they can impact their businesses, all without disrupting the customer experience.
Forrester found in their survey that organizations that deployed Shape Security improved bot blocking by up...
Ransomware attacks are not only becoming more sophisticated, but also more frequent. Empower your enterprise by protecting them from malicious activity by learning to implement the most effective security strategies with the Microsoft security stack and staying ahead of impending cyberattacks.
Download this eBook to...
Learn how Cisco Umbrella provides visibility into all internet requests across your network, across every port, protocol or app, to uncover and block connections to malicious domains and IPs.
Many current application security controls are limited and unable to control fraud problems, says Vaibhav Khandelwal, security and fraud lead, Asia-Pacific, China, Japan at F5. He discusses application fraud challenges and trends.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.