It feels like we hear about a new devastating cyberattack in the news every day, and attack methods seem to be proliferating at an exponential rate. So, which tactics should you be aware of beyond standard “click and infect” attack vectors?
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and...
The LexisNexis® Risk Solutions True Cost of Fraud™ Study helps companies grow their business safely by navigating the growing risk of fraud. The research provides a snapshot of current fraud trends in the APAC retail, ecommerce, financial services and lending markets.
The study covers insights for Singapore,...
What makes authorized payment scams hard to detect? The speed and volume of transactions hinders banks in monitoring for fraud, but David Lott, payments risk expert with the Federal Reserve Bank of Atlanta, says educating customers and leveraging the right technology can help reduce scams.
Ransomware shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all bolstering the Ransomware Attack Chain, creating new planes of privileges for ransomware to exploit.
Breaking the chain is more vital than ever. Despite this, organizations...
Some experts predict cyber insurance rates will increase 40-75% in the near future, and MSPs need to take action now to protect their profits and businesses in 2022 and beyond. The panelists will explore why ransomware attacks are at the heart of these increases. This webinar features expert insights from:
Richard...
As the number one threat vector for most organizations, email continues to be widely used by cyber criminals to penetrate organizations in support of a wide variety of cyberattacks. Unlike other attack vectors, email enables cybercriminals to directly leverage humans in an effort to bypass security controls and...
The latest edition of the ISMG Security Report discusses how financial service organizations should respond to the new "fraud universe." It also shares how CISOs can incorporate social media into their threat intelligence programs and describes the skills required by today's security leaders.
The ultimate role of cyber security is to reduce the risk to an organisation. But with such a broad range of opinions, tools, compliance standards, and products, knowing where to start and what will give the greatest return on investment is crucial.
In this you will learn:
How to understand the greatest risks...
Effective security and risk programs require not just domain mastery but making security accessible to boards of directors and senior officers, says Karin Höne, the group chief information security and risk officer of South Africa-based multinational Barloworld.
Mark Read, head of data breach solutions for TransUnion in the UK, shares insights on the current data breach landscape, including how businesses should respond to a data breach in order to reduce its impact. "The most successful responses often include the offer of a remediation solution," he says.
The accelerated shift to digital banking has led to a surge in online fraud of all types. Recent studies have shown that 33% of U.S banks’ fraud costs in 2021 came from online banking – a 26% increase from 2020. The increased complexity, volume, and speed of today’s online transactions mean that organizations...
Ten years from now, "the ability to transact on a global basis will continue," says Nick Coleman, CSO, real-time payments at MasterCard, who adds, "Maybe my car will buy stuff for me." Coleman discusses the future of digital payments and the technologies that can help secure that future.
in the Frost Radar™ US Healthcare Cybersecurity Market
More than 90% of all healthcare organizations reported at least one security breach over the last 3 years. Robust cybersecurity has become a top priority and an essential requirement for all C-level healthcare executives. The most crucial challenges related to...
The Nigerian Police Special Fraud Unit says it busted a criminal syndicate, preventing cyberattacks against at least 10 banks in the country. The alleged mastermind was caught by the police, along with two alleged gang members, and another alleged member absconded, the police say.
If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.