The healthcare industry is now the second most targeted vertical in the world, however despite increased regulatory oversight, cyber threat awareness and security investments, breaches continue to happen. Personal health information (PHI) and electronic health records (EHR) are particularly sensitive as they are...
Certain cloud security solutions will protect you today but which are best designed for the future?
Download this checklist to determine how ready your cloud security solution is to meet the challenges of the Vanishing Perimeter and deliver always-on, everywhere protection.
The real security challenge with cloud computing is the perceived loss of control, including challenges with visibility into the provider environment and possible incompatibility of security tools and controls in the cloud.
Fortunately, there are numerous security best practices for cloud service and delivery...
Security for the cloud generation is anything but simple.
The explosive growth in the volume of mobile users, cloud apps, remote offices and compliance requirements, coupled with a host of emerging security threats, has created a perfect storm of complexity that is pushing network operations and security teams to...
There has been so much hype around AI that seeing concrete examples of how the use of this technology can impact real world problems is often lost in the noise. This document takes a look at three scenarios from the Verizon Data Breach Report that have happened at specific organizations and details how AI can be...
Many third-party risk management (TPRM) programs rely on tools and processes that are expensive, non-scalable, and ineffective at reducing risk. Additionally, some TPRM professionals (and the individuals who approve their budgets) are relying on subjective, outdated information to make decisions - and that information...
With growing numbers of data breaches being traced to third parties with lax security controls and processes, organizations need to implement "always-on" vendor risk management programs.
Download this report and learn why:
Third-party data breaches are so common and damaging;
Third-party risk management programs...
New account fraud is rising and within that, Identity Fraud is clearly the winner. The vast majority of such cases involved the abuse of an innocent victim's identity, rather than a fictitious identity. The availability of large amounts of personal information obtained from hacking, phishing or data breaches continues...
The Internet of Things (IoT) presents opportunities for everyone. Trouble is, that includes fraudsters. And when it comes to the insurance sector, that means big headaches.
Read this briefing and find out about the threats you need to watch out for, as well as how you can harness the potential that IoT offers.
Chatbots and Artificial Intelligence (AI) platforms are transforming the way insurers interact with customers - taking the fuss and frustration out of policy admin and the claims process. But alongside these enticing headline benefits, bots can deliver a potential boon behind the scenes too - helping empower insurers...
New research has found that 74% of business customers think banks use machine learning and artificial intelligence to spot money laundering. In reality banks rely on human investigators to manually sift through alerts - a hard-to-believe fact selected only by 31% of respondents. This lack of automation and modern...
Companies want to understand and implement threat hunting practices, but in reality - and with a limited budget - it is not always feasible to do so in-house, given the demand for resources and skills. That's where managed threat hunting enters. More often, organizations want to use that funding to shore up defense...
Implementing an end-to-end privileged access management solution should follow a defined process to minimize costs and distractions, and speed results.
Throughout the process of selecting and deploying your privileged access management solution, keep in mind these business requirements, as they will help you sell...
The insider threat. It could be the malicious insider who intentionally sets out to commit fraud, steal intellectual property or cause damage. Or else it could be the so-called "accidental insider" who makes a mistake or is taken advantage of by an external threat actor. Either way, the business impact is real, and...
Despite the harsh reality that card not present (CNP) fraud is a serious problem that which is only getting bigger, senior management is not giving this issue the attention that it deserves.
Some executives fail to recognize the correlation between fraud management and the organization's overall growth and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.