Security experts testified to Congress that the National Institute of Standards and Technology is better placed than the Transportation Security Administration to lead national implementation efforts for security-enhanced identification cards ahead of a looming 2025 deadline for national compliance.
Protected Health Information (PHI) includes medical histories, lab results and vital signs, as well as addresses, social security numbers, birth dates, billing and payment card data, and other personally identifiable information (PII).
It is no wonder the healthcare industry has become a favourite target for hackers,...
For healthcare providers and payers, finding new ways that allow consumers to transact with confidence in any channel – and on any device - while maintaining the security of payment and personally identifiable information (PII) is vital for ensuring they – and the patients they serve - are protected from...
A multi-layered identity solution strategy that also incorporates near real-time event data from a global consortium, will help improve fraud capture.
Businesses that leverage a multi-layered approach based on a unified view of physical, digital and behavioural identity will have the ability to respond more...
Public sector organizations continue to be prime targets for cyber crime, given their responsibility for highly sensitive data, such as health records, intelligence information, student data, and citizen IDs.
Perhaps not surprisingly then, out of all industries globally, the education sector experiences the highest...
Why are we talking about metadata? Why now?
Because metadata has fairly obvious limitations that are being overlooked.
The problem isn't that we create or use metadata — it is the way it is used that causes trouble.
This white paper dives into:
The good, bad, and the ugly of metadata
Why metadata isn't...
SailPoint has agreed to buy U.K.-based privileged access management vendor Osirium for $8.3 million to better protect privileged and non-privileged identities on a single platform. The deal will allow Osirium to benefit from SailPoint's increased scale and enhanced sector and regional capabilities.
Many large and complex organizations are faced with an inability to gain visibility into user access permissions beyond the role level—so don’t feel bad if you’re among them. Without that critical information, it’s nearly impossible to constrain user access effectively, across both human and non-person...
Organizations are shifting to agile, cloud-based, digital platforms to address changing business environment as part of large Digital Transformation projects. Cybersecurity groups are working to address this changing environment, requirements, and business needs, and are establishing that legacy solutions often...
The U.S. federal government says hacker abuse of valid credentials is the most successful method for gaining access to systems and the technique is responsible for slightly more than the half of critical infrastructure attacks that occurred over a yearlong period.
Digital transactions and interactions have experienced unprecedented growth, driven by the evolving digital landscape and changing consumer behavior. The COVID-19 pandemic accelerated this transformation, compelling even traditionally offline businesses to establish a digital presence and offer mobile apps and online...
Fraud leaders are under pressure to prevent fraud while also providing a frictionless customer experience. Email addresses are the logical front-end fraud prevention layer because they leave a trace of every online interaction. This trace can be used to assess the risk of every transaction, and it offers less friction...
A survey of fraud executives found that 85% saw an increase in fraud losses in 2022, with the mobile channel accounting for the majority of this increase. This whitepaper explores strategies to strengthen fraud prevention and mitigate the impact of online attacks.
In the rapidly expanding digital economy, fraud...
The Asia Pacific region has experienced a significant surge in online fraud due to the COVID-19 pandemic. Phishing, vishing, and smishing attacks have become rampant, with phishing attempts rising by 75% and vishing attacks increasing by 554%. Notably, bot attacks have risen by 135%. It is crucial for businesses in...
This Case Study talks about DNP is a comprehensive printing company as they enhance risk decisioning as part of its 3DS workflow.
A reliable risk assessment can be given for online payments, regardless of whether this is the first time the card has been used, or when a 3DS security password has not been registered....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.