Modern organizations often have complex cloud and on-premise environments often managed with siloed security tools. This situation leads to fragmented visibility, an inability to prioritize risks for remediation and a lack of business-level reporting.
In this webinar, security leaders will learn how cloud security...
Expel has released its latest quarterly threat report, which looks at continued identity-based attacks and the impact of MFA fatigue. Jon Hencinski shares insights on attack trends, gaps in compensating controls and what to look for in pre-ransomware activity.
Digital transformation we all have experienced over the last few years, everything online is at risk of fraud – fraudsters will try to take advantage over customer digital footprint at any time and access point. Telesign's Seth Gilpin shares insights.
Cloud email security: It involves new strategies and tools to defend against a new wave of attacks. Arun Singh of Abnormal Security discusses the latest flavor of email attacks and the new Knowledge Bases created to help enterprises increase their education and defensive capabilities.
Social engineering scams are on the rise globally. Last year, these scams increased 57% with an average lost of $1,029 USD per victim. Aside from the inability of legacy fraud controls to detect real-time social engineering, the circumstances of a scam can influence liability if the parties involved are unable to...
Our online evolution has accelerated drastically in recent years, with more than 30 billion internet-capable devices now online, six times as many as there are people on the planet, according to McKinsey.
Cybercrime, specifically fraud, is rising nearly as fast as our global digital transformation. Protecting...
For many brands, especially large enterprises with a substantial online presence, it is important to be able to have eyes all over the internet in order to properly mitigate the effects of external elements on their brand’s reputation.
The email attack vector. It may not earn much discussion, but the adversaries take full advantage of it with phishing, BEC and now email platform attacks. Mike Britton, CISO of Abnormal Security, talks about the latest threat trends and how to detect and defend against them.
Microsoft 365 offers tiers of security features, but their email security capabilities may not be as robust as their popularity. Your organization sends thousands of emails every day, and email can be one of the most vulnerable methods for attacks. Phishing, malware, ransomware, stolen credentials, and more can all be...
What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords with ease? And what can/should you do to improve your organization’s authentication methods?
Password complexity, length, and rotation requirements are the bane of IT...
Application fraud has spiked - particularly bogus new accounts - and organizations are scrambling to improve fraud detection mechanisms without negatively affecting the legitimate customer's experience. Robin Love of Early Warning shares insights on how to better predict new account risk.
Most businesses say that preventing fraud is their top concern—and that challenge is only getting harder. The worry is understandable given that fraud increased by 70% in the last year to more than $5.8 billion.
There is a growing expectation to secure themselves that businesses recognize as well as to protect...
Since the pandemic began, 55% of consumers have higher expectations for their digital experience and that expectation is only growing.
Users — from individual consumers to various small businesses — expect the ability to interact with just about every service online these days. Failure to offer a smooth...
In recent years, fraudsters have become more devious, creating profiles with minimal barriers to entry — grocery shopping apps, social media profiles, etc. — to make these identities appear legitimate. Once approved, SIDs behave like legitimate accounts and are often not flagged as suspicious by usual fraud...
Security firm Group-IB has identified 34 hacking groups that are now selling a stealer-as-a-service model to spread infostealer malware and steal credentials from online gaming and payment accounts. The company advises organizations to be on the lookout for Raccoon and Redline infostealers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.