This case study illustrates how Digital Shadows helped the head of threat intelligence at a bank discover a user on the dark web claiming to be a bank employee selling access to high net worth individual's accounts. The fact that the seller appeared to be an employee, this threat was of heightened priority to this...
When a privileged account gets hacked, it allows the attacker to impersonate a trusted employee or system and carry out malicious activity without being detected as an intruder. Once attackers compromise a privileged account, they can typically roam at will through an IT environment to steal information and wreak...
This eBook introduces IT professionals to next-generation multi-factor authentication (MFA), an approach to authentication that goes well beyond usernames and passwords to provide the right level of security assurance at the right time, anytime. Next-generation MFA also streamlines authentication while empowering...
Fraud is constantly evolving, meaning your fraud prevention strategy needs the flexibility to change in order to keep pace and outmaneuver fraudsters.
Download this tip sheet to learn the tools you need to consistently outsmart the fraudsters regardless of their schemes and alternative methods.
Traditionally, fraud teams have taken a defensive approach to fraud prevention as each new type of threat appeared. Nowadays, fraud is evolving rapidly as criminals become more sophisticated. It's time to take a proactive stance!
Without a proactive fraud strategy, customers can get caught in the middle with either...
Fraud and associated compliance issues are becoming an increasing challenge for financial services companies today. Fraud approaches are constantly changing and the cost of fraud prevention is increasing, making it more important to keep up.
What's needed is a flexible fraud prevention strategy that leverages your...
Even the most well-intentioned employees risk leaking sensitive data or inadvertently letting in malware that can wreak havoc on your network and systems.
Give your employees the proper training and knowledge to make them your most important line of defense against cyber threats.
Download this checklist and...
This monthly Security Agenda will highlight some of the most recent additions to our course library. September's edition features Ed Amoroso on the evolution of the role of a CISO. Other influencers like Hearst CISO David Hahn, First U.S. CISO, Gen. Gregory Touhill, Retired and Jennings Aske, CISO of New...
This monthly Security Agenda will highlight some of the most recent additions to our course library. March's edition features Former Federal CISO
Gregory Touhill giving a "Cyber State of the Union." Other industry influencers like Retired RSA Chair Art Coviello, FBI Cyber Division Supervisory Special Agent Jay...
See the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University, where the CERT (Computer Emergency Response Team) function was created. The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a huge...
See the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University, where the CERT (Computer Emergency Response Team) function was created. The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a huge...
Session Preview:
See the startling results of meticulous analysis of hundreds of real life insider attacks and learn about new technologies that are able to detect the anomalous behavior patterns often before fraud occurs.
The analysis results clearly indicate that contrary to the majority of headlines, stealthy...
A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
How can organizations mitigate the risks posed by the unintentional insider threat? The strategy requires a combination of technical and non-technical solutions, says researcher Randy Trzeciak.
For years, researchers have studied malicious insider threats. But how can organizations protect themselves from insiders who make a mistake or are taken advantage of in a way that puts the organization at risk?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.