How could attackers trick you, an intelligent professional, into handing over company funds?
They impersonate someone you know and trust.
According to the FBI's latest BEC/EAC alert, businesses worldwide experienced a 2,370% increase in actual and attempted dollar losses from BEC/EAC scams between January 2015...
Phishing, spearphishing, CEO Fraud/Business Email Compromise (BEC) and ransomware represent a group of critical security threats that virtually every organization will encounter at some point - and most already have. The logical evolution of phishing are increasing rapidly and costing organizations hundreds of...
There's no denying that Office 365 is a big deal. It's a big part of the Microsoft Intelligent Cloud strategy. It's big in terms of its user base. And it has a big impact on your network.
Office 365 is unlike any other SaaS app and, even with careful planning, it's fair to say that deployment doesn't always go...
Is it possible to implement an Office 365-ready network, at scale, without a proof-of-concept (PoC)?
While many companies have had challenges with Office 365, others have realized that understanding a few key network concepts can make all the difference.
Download this whitepaper that helps define the key steps...
Office 365 is the fastest growing and most broadly used SaaS platform in the enterprise; organizations are adopting it to improve productivity, reduce cost and complexity, and focus internal resources on their core business. However, when you deploy Office 365 in a large enterprise, the work of thousands moves from...
Card issuers can view the merchants with whom a cardholder does business, the frequency of a cardholder's purchases, and the devices and IP addresses associated with that specific card. While this allows them to understand and assess certain patterns of behavior for individual cardholders, it restricts analysis to the...
When cardholder transaction and device data are disconnected, the potential for card issuers to more accurately detect and flag instances of fraud remains untapped. And as the connectivity of information in the real world continues to increase, so will related risks from fraudsters if issuers continue to rely solely...
If you're an IT professional, you need to keep your end users safe. That means knowing how to prevent attacks and how to recover if one lands.
Download this whitepaper that discusses:
The lifecycle of a malware attack-and the defenses that can snare those attacks at each step
An essential technique you can use to...
Four years ago, Aetna Global Security hired a chief data scientist for security - a former NSA data scientist who did an outstanding job building over 100 models and a big data infrastructure dedicated to security. The purpose of hiring this data scientist: to take multiple sources of log files from newly deployed...
It's critical for entities to remember that major infrastructure cloud services providers have a very limited responsibility for their customers' data security, says Kevin Flynn of Skybox Security.
Attackers are increasingly hacking into banks' networks to gain access to the IT infrastructure connected to their ATMs, security experts warn. Attackers push malware onto ATMs that's designed to allow money mules to "jackpot" or "cash out" the machines, then delete itself.
It's the age of "open banking," and that means changes for banking institutions and their customers - as well as for the fraudsters. Shaked Vax of IBM Security Trusteer talks about new vulnerabilities and anti-fraud strategies.
A survey of more than 675 small, mid and large-sized enterprises to understand attitudes towards and progress along the Office 365 journey has provided an insight into customer adoption of cloud technology.
Download this infographic to learn the key findings:
Cloud migration in North America is further along than...
A survey of more than 420 small, mid and large-sized enterprises to understand attitudes towards and progress along the Office 365 journey has provided an insight into customer adoption of cloud technology.
Download this infographic to learn the key findings:
Cloud migration in EMEA is further along than predicted...
A survey of more than 420 small, mid and large-sized enterprises to understand attitudes towards and progress along the Office 365 journey has provided an insight into customer adoption of cloud technology.
Download this infographic to learn the key findings:
Cloud migration in EMEA is further along than predicted...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.