The current state of endpoint security is a "good news / bad news" situation. The good news is that in recent years there has been a modest trend towards fewer vulnerability disclosures, meaning slightly fewer potential ways for computing infrastructures to be exploited. The bad news is that an increasing percentage...
This white paper looks at how payment innovation is impacting fraud departments and the growing importance of removing friction to improve the customer experience. The mobile and online channels are the future; being able to authenticate returning customers and determine who new applicants really are will be essential...
The National Cybersecurity Center of Excellence (NCCoE) at NIST has created a series of free resources touting best industry practices that utilize the latest technology, automation and system controls to guide industry professionals through minimizing their cyber risks and identifying threats. These practices go a...
Financial organizations currently subject to the FinCEN SAR eFiling will soon have to make major changes to comply with the new rules by January 1, 2019. The suspicious activity types that need reporting have been updated, new fields have been added, and the ASCII format is being updated just to mention a few things...
Behavioral analytics have taken the fast lane from emerging tech to mature practice.
The key element that has made behavioral analytics move so fast and become something so important to security is that the focus has been not on the technology itself but on the value it provides the enterprise, notably when being...
Cyberattacks and damages due to email breaches dramatically increased again this past year. The FBI estimates $5 billion in losses worldwide as email continues to be a primary attack vector for the initial compromise, with business email compromise accounting for $676 million in losses alone in 2017.
As SMB...
Look at information security through the lens of business risk, and you'll begin to make decisions about security in light of their impact on the business.
With security threats emerging faster than ever, what if your most important information is not protected? What strategic business advantage do you gain if it is...
Risk managers in particular have a vested interest in ensuring their organizations are in ongoing compliance with GDPR.
If you are concerned about your organization's GDPR compliance, download this guide and learn:
A history and background of the GDPR;
A number of noteworthy compliance indications;
Six...
To build out the business structure and technical functionality that enables your organization to deliver products and services quickly and efficiently, you have to know how you're doing compared to how your competitors and peers are doing.
In other words, CIOs today must be highly effective at...
Without fostering feelings of responsibility and accountability for cybersecurity among employees, security awareness training won't necessarily make an organization any safer or less vulnerable.
Download this eBook and learn:
Why current awareness practices don't work;
The value of evidence-based awareness;
How...
Big data and artificial intelligence have sparked a paradigm shift in risk management. From cybersecurity to PR to logistics, continuous monitoring is already making a major impact.
Download this eBook and learn how continuous monitoring technologies are transforming a range of risk areas such as:
Vendor...
How can security ratings help you identify, quantify, and mitigate cyber risk? Smart benchmarking requires objective, verifiable and actionable metrics on security performance.
Download this eBook and learn how:
To create a framework for effective cybersecurity benchmarking;
Security ratings can be used to...
A Shift Toward a Human-Centric Approach to Information Security
Every IT security department's job, to protect data, has become more challenging as the security perimeter has dissolved with the adoption of cloud applications. The traditional threat-centric approach is to apply rigid policies to a dynamic...
Every day, as employees routinely use applications and share data, they leave behind an invisible "access footprint" - credentials and connections to other systems. These are the basic tools - keys - that advanced
attackers use once inside your network to move from their initial point of entry to their targets. The...
When should a technology or security leader get involved in M&A? The short answer: as early as possible. Security
really should play a prominent role before, during, and after the acquisition activity.
Download this eBook to learn more about:
High-profile incidents of cyber disruption during M&A;
How security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.