The global fraud landscape has shifted dramatically in the past year. Uri Rivner and Erin Englund of BioCatch discuss the urgency of catching money mules, stopping synthetic IDs and schemes that result from deep social engineering.
Sophos recently released its 2021 State of Ransomware report, and it includes surprising findings on remediation costs, which have more than doubled over the past year. Dan Schiappa tackles the question: Does it pay to pay ransoms?
Increased reliance on the agile and remote work model has created more opportunities for MSPs. WatchGuard CEO Prakash Panjwani shares advice on how to engage an MSP that fits into the organization’s business model and establish a good partnership.
Having exponentially more devices on the network leads to proportionately less visibility. This is reality for most enterprises today, and it’s changed the role of endpoint security solutions. Elias Levy of Cisco discusses emerging technologies and strategies, including the rise of XDR.
With the volume of data breaches and cyberattacks continuing to rise, organizations are increasingly relying on breach and attack simulation tools to provide more consistent and automated validation of controls, says Cymulate's Tim Ager.
CrowdStrike is out with its 2019 Global Threat Report, which includes a ranking of the most dangerous nation-state adversaries. The company's CTO, Dmitri Alperovitch, discusses the report's key findings about threats and threat actors.
Reviewing 2018 attacks, Jon Clay of Trend Micro, says social engineering persists, including phishing attacks, while criminals also continue to steal credentials, lob ransomware at targets and push cryptomining malware.
What's hot on the cybersecurity legal front? For starters, in 2018, the U.S. Department of Justice indicted twice as many alleged state-sponsored attackers than it had ever indicted, says Kimberly Peretti of Alston & Bird.
The network is much more than just the sum of its endpoints, and the imperative to secure everything has led to detection and response emerging as a top priority for many organizations, says Chris Morales of Vectra Networks.
Fraudsters break into your network by phishing for access in increasingly sophisticated ways. Anthony Giandomenico of Fortinet describes the importance of tracing every step in the attack lifecycle when devising an effective security strategy.
How do you effectively secure healthcare networks when so many devices access them? Deena Thomchick of Fortinet discusses the unique challenges faced by healthcare leaders required to guard against incursion, both by outside hackers and insiders.
In an age of ubiquitous information sharing, it is critical to control how information is presented - and to whom. Lynne Courts of Seclore discusses new security strategies and solutions that address this need.
Bank of the West prides itself on being an innovator in customer education about fraud prevention. But customers still don't want to be inconvenienced with arduous security hoops, says bank fraud prevention officer David Pollino.