Fraudsters' methods of attack are evolving. Download this guide to learn how to detect account takeover attacks with adaptive MFA, risk analytics, and machine learning.
In this eBook, you will learn:
6 fraud techniques that lead to account takeover attacks;
How to help prevent attacks on the login process,...
A flaw in how contactless cards from Visa - and potentially other issuers - have implemented the EMV protocol can be abused to bypass PIN verification for high-value transactions, ETH Zurich researchers warn. But Visa says the exploits would be "impractical for fraudsters to employ" in real-world attacks.
European banks are not ready to meet the Dec. 31 deadline to comply with the PSD2 regulation, which requires strong customer authentication when providing API access to banking platforms, says Dr. Steven J. Murdoch, a principal research fellow at University College of London.
The Reserve Bank of India's draft of a framework for new self-regulatory organizations, including one that would help oversee payment system operators, fails to adequately address security issues, some observers say.
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.
When implementing a cybersecurity risk framework, enterprises should use a structured approach to identity and evaluate and manage the risks posed by increased digital transactions during the pandemic, says Dmitry Chernetsky, global presales expert, Kaspersky-APAC.
Digital identity will be a dominant technology trend over the next decade, within the financial services industry, and more broadly in our digital economies. But banks can't take their prime position in digital identity for granted. Even in countries where banks have already driven the digital identity agenda,...
It's little wonder financial services is such a targeted sector considering the massive shift those organisations have made in digital transformation. But, the strive to create an agile enterprise by placing more applications and workloads into most likely, a hybrid cloud environment, comes at a price - complexity....
The U.K.'s privacy watchdog is probing banking giant Barclays over its use of employee monitoring tools after the bank in February reportedly shifted from anonymized tracking to giving managers the ability to view data for individual employees.
Bank robbers are not the same today as they were a decade ago, and neither are your banking customers. Today's robbers are more covert. More nefarious. But if you know how to think like modern-day bank robbers, you'll know how to protect yourself - before they break in and destroy your systems, finances and...
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
Organizations are finding it hard to achieve their security goals with the supply of highly qualified security experts being low and the demand astronomically high.
The Information Security Officer (ISO) at a large bank, serving a variety of commercial businesses, construction companies and the farming community,...
There are millions of organizations attempting to ward off hackers, comply with regulations, keep their employee and customer data safe, measuring risk levels, all while creating or maintaining a resilient security culture.
Discover how Investors Bank leveraged Digital Defense's Vulnerability Manager to optimize...
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on July 27 a virtual cybersecurity summit for India on applying the model.