It's becoming increasing important to detect adversaries that have bypassed your security controls and moved laterally in your environment, says Carolyn Crandall of Attivo Networks, who describes the role deception can play.
As CSO of Mastercard, Ron Green has a clear view into the tactics of payment card fraudsters, as well as how the company is responding to fraud trends via its Fraud Fusion Center.
What are the prevailing fraud trends, and how are they impacting consumers, clients and enterprises? Dora Gomez, director of the New York City chapter of the Association of Certified Fraud Examiners, shares highlights of the ACFE's new Report to the Nations.
Do real-time payments inevitably lead to real-time fraud? Debra Geister of NICE Actimize describes some of the fraud challenges of moving to faster payments.
As financial fraud has evolved, so have the defensive tactics of major banking institutions. Citi's Jeffrey Dant, a former Secret Service agent, discusses Citi's Fraud Fusion Center - it's mission, challenges and early successes.
How well can banking institutions apply the right amount of security to the right transactions at the right time? Tim Bedard of OneSpan answers this question in his analysis of ISMG's new State of Adaptive Authentication in Banking survey.
Malicious bot attacks now account for nearly one-third of all internet traffic, says Franklyn Jones of Cequence, who describes why conventional tools for fighting against these attacks are ineffective.
Communication of cyber risks to executives using enterprise risk methodologies is imperative for improving incident prevention, according to Randy Trzeciak and Brett Tucker of Carnegie Mellon University, who offer tips.
The operational technology world is focused on two things: safety and reliability. But with increasing IT-OT integration, cybersecurity needs to be considered the third leg of the stool, says Phil Quade, CISO at Fortinet.
Many third-party risk programs address information technology but not operational technology, says Dawn Cappelli of Rockwell Automation, who discusses why OT security should be a priority.
Analyst turnover is a pervasive problem for the cybersecurity industry. Mike Armistead, CEO of Respond Software, sees robotic decision automation as a solution.
Because of the wealth of personal information available on the dark web, breach detection and remediation are more urgent than prevention and protection, says Nick Hayes of IntSights.
Email remains the top threat vector for organizations. And while the move to cloud-based solutions has significantly improved email security, environments such as Office365 have their own complexities that need to be addressed, says David Wagner, CEO of Zix Corp.
The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface. And as a result, the definition of threat intelligence is changing, says Vishak Raman of Cisco.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.