Occupational fraud and insider threat is not new, and it is universal threatening all types of businesses and industries. It can be difficult to detect, and its adverse impact on the enterprise is growing. The key to building an effective strategy is to understand your organization's key vulnerabilities and risk to...
You've seen the headlines about the Federal Trade Commission's messy legal battle with LabMD, a cancer screening service that was investigated for two alleged data security incidents in 2008 and 2012. Last November, an FTC administrative law judge ruled to dismiss the FTC's case against LabMD, saying the FTC "failed...
What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misperception allows one of the biggest threats to your organization's data to stay completely under the radar the...
Recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-factor authentication, device ID systems, risk engines and behavioral analytic systems. Banking malware such as Citadel, Zeus, Dyre and Bugat, incorporate advanced...
How do Organized Fraud Rings (OFR's) monetize the personal information made widely available from the growing number of data breaches? How can we detect and disrupt this activity?
From these breaches, fraudsters obtain just enough personal information to access user accounts or attempt to pull free credit reports...
In our increasingly mobile society, organizations, their employees, partners and customers are at greater than ever risk of identity theft and fraud. How prepared are organizations to mitigate these risks? It's not enough to have a breach response strategy. Do you have the right players and pieces in place to execute...
Until we get to a stage where we can guarantee the confidentiality of traditional identity reference data such as names, addresses, emails and favorite cat colors, we must move away from relying on this static data for authentication. Truly massive amounts of this information are stolen on a regular basis, proving we...
Identity theft - or impersonation - is a well-established form of identity risk but first party fraud, and synthetic identities in particular are fast growing and insidious threats that bring with them economic loss for financial institutions, as well as risks of regulatory censure when synthetic identities pass Know...
As Keith Alexander tells it, when he led the National Security Agency, he didn't exist. Alexander discovered that 'fact' after he retired on May 21 as director of the NSA and commander of the Cyber Command and began shopping to buy a new home.
A new identity fraud study shows that consumers who are victims of a payment card breach are at greater risk of fraud than victims of other types of breaches, says Al Pascual of Javelin.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.