A majority of financial institutions have reported a rise in account opening fraud and payment scams, which is expected to continue and cause losses for banks, says Trace Fooshee, strategic adviser at Aite-Novarica Group. He discusses new technologies to put in place to mitigate scam attacks.
How can organizations improve their resilience in a world that seems increasingly unpredictable? Advisory CISO Wolf Goerlich of Duo Security at Cisco shares findings from Cisco's Security Outcomes Study and offers considerations for CISOs on how to build robust cyber resilience programs.
Zero trust, identity-first and perimeter-less security - they all need digital identities to establish digital trust. Join Sectigo's CSO and former Gartner analyst David Mahdi to learn about the importance of identity-first security and establishing digital trust for human and machine identities.
Everyone knows the OWASP Top 10 lists of application security and API risks. But what about #11 and beyond - aren't those key priorities, too? Matt Tesauro of Noname Security talks about "Beyond the Top 10" and relates it back to mitigating the Log4j zero-day vulnerability.
Identity: In most instances it can be an asset. But occasionally, left improperly secured, it can be a roadblock for an enterprise. Wade Ellery of Radiant Logic explains the Identity Data Fabric and how it can help enterprises solve major business problems.
COVID-19 has been a game changer - not just in how government agencies deliver services, but in how fraudsters try sneaking illegal access to them. Ryan Schaller, senior CIAM developer specialist at Okta, discusses these new faces of fraud and what state and local governments can do to combat them.
Digital transformation has not been lost on higher education. But IAM approaches are often homegrown and antiquated. CIAM offers a new approach that can streamline and optimize the student digital experiences, says Okta's Ryan Schaller.
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
One of the effective ways to tackle AML fraud is to leverage technologies such as behavioral biometrics and device biometrics, says Charles Subrt, director of the fraud and AML practice at Aite-Novarica Group.
The network detection and response market is "relatively unchallenged at this point by other markets," and detection is the most important use case, says Nat Smith of Gartner, who shares key findings from the company's report titled Emerging Trends: Top Use Cases for Network Detection and Response.
Attackers are innovating constantly to try to increase their success rates as they work to evade detection and mitigation technologies in the kill chain. But the future isn’t just more and more attacks.
This webinar helps to understand the evolution of DDoS extortion, its ramifications on 2021 security postures, and the latest best practices to fight back and reduce your risk.
Join Akamai solution engineers Ashwini Naidu, Swagatta Dutta Choudhury, and Felix Addo for an interactive workshop as they take a deep dive and dispel myths about cloud WAF.
In this session Akamai will share some of the research and insights into the tools, tactics, and techniques attackers are using to launch their malicious onslaughts while remaining under your defensive radar.
While overregulating the cryptocurrency space is not advisable, it is important for the Biden administration to look into the areas in which cryptocurrencies pose the greatest risks, says Nichole Dennis, director and government relations specialist with Cybercrime Support Network.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.