The new year has kicked off with a flurry of data security company acquisition activity; five deals have already been announced. Companies making acquisitions are striving to improve their secure access service edge - or SASE - posture, enter new markets or bolster their technology portfolios.
Many companies claim to be successfully using artificial intelligence for security, but the use cases are still not convincing because the technology is incapable of detecting unknown malware, says Guy Sheppard of SWIFT.
Quickly and Easily Deploy a Comprehensive Contact Tracing Solution
Contact tracing is a critical tool for slowing the spread of communicable diseases like the Covid-19 coronavirus, by helping admins identify the individuals an infected person has been in contact with to contain widespread transmission. State and...
Why Start With Identity?
As more government organizations move their citizen services to mobile and cloud-based platforms, ensuring the validity of those benefits claims is more important than ever. Many are adopting an identity centric security model as a framework for prevention of risk and fraud.
How do you protect your customers and employees from rampant phishing and typosquatting attacks that pop up every day? Criminals are banking on the fact that you can't find every single one to block them or warn customers and employees about every new attack. Bolster protects against phishing and typosquatting scams...
First you had 'shadow IT,' then 'shadow cloud.' Now enterprises are encountering 'shadow APIs' - and the lack of visibility into these interfaces is causing new, often overlooked cybersecurity vulnerabilities, says Subbu Iyer of Cequence Security.
Brand impersonation - it isn't just a marketing or reputational issue. It's an InfoSec problem, says Shashi Prakash, CTO and co-founder of Bolster. He describes the growing problem and why security is best positioned to lead detection and response.
In this eBook learn how organizations can achieve cyber resilience in an increasingly digitized world. Gain quick tips on how to get the board’s attention and approval on CyberSecurity investments. And finally, deep dive into how to combat cyberattacks effectively with a CyberSecurity Incident Response Program.
Like you, cybercriminals are on their own digital transformation journey. Trends like remote work, Internet of Things (IoT), bring-your-own-device (BYOD) and cloud initiatives have given hackers new ways to infiltrate your organization by exponentially expanding the attack surface. Technologies like artificial...
"Has anyone witnessed any examples of criminals abusing artificial intelligence?" That's a question security firms have been raising. A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging
As synthetic ID fraud in the financial services sector continues to rise next year, organizations must use new technologies to mitigate the risks, says Saif Nawaz of Meridian Credit Union in Canada.
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
Traditional anti-money laundering (AML) and combating the financing of terrorism (CFT) tools and tactics take longer and cost more than they should. To fortify the defense, financial institutions need ways to:
Automate tasks that formerly required human intervention, such as disposition of alerts
Detect more risk...
There's a lot of talk about advancing the anti-money laundering arsenal to the next level, sometimes referred to as next-generation AML, AML 2.0 or AML 3.0. Whatever you call the next wave of AML technology, it's about solutions that draw on such advances as robotics, semantic analysis and artificial intelligence...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.