A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?
A key component of President Obama's executive order to encourage industry to share cyberthreat data is the creation of information sharing and analysis organizations, or ISAOs. But now, the hard part begins: defining the job and getting it done.
The Anunak/Carbanak gang continues to rob financial services firms and retailers, in part with ATM malware. A new report says the cybercrime gang has stolen up to $1 billion from banks in Russia, the U.S. and beyond.
At a White House summit at Stanford University today, President Obama will sign an executive order to encourage more private sector information sharing. But will businesses buy into his proposals?
IBM Trusteer malware researcher Ori Bach says financial fraud attacks coming out of Brazil are having a global impact, and he offers insights and lessons for banking institutions throughout the world.
The president's proposal would provide stronger privacy protections than legislation passed by the House in the last Congress, and furnish targeted liability protections to businesses that share cyberthreat information.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?
Intelligence is critical in mounting an effective defense and, equally as important, is an effective offense. This session will look at intelligence gathering from both sides of the DMZ. There is a great deal of critical information available about your adversaries and a startling amount about you, your organization,...
Law enforcement agencies have gained incredible clarity into the perpetrators of fraud, their motives and methods as well as their victims, the cost to the industry and developing trends. But to effectively investigate and prosecute these crimes, public-sector organizations need to better understand the driving...
The National Institute of Standards and Technology has released a draft of guidance aimed at helping government agencies and businesses establish, participate in and maintain cyberthreat information sharing relationships.
Collecting security and fraud related data from multiple sources can often just result in creating a very large pool of unrelated facts. But, begin to add context to that data and you now have information. Triangulate multiple pieces of information together and you can create intelligence.
This session will answer...
How is technology evolving to analyze multiple and massive streams of data in real time to detect fraudulent activity? The NSA has pioneered data collection techniques at a staggering scale, potentially monitoring all activity for an entire country. Facebook has pioneered adversarial machine learning fraud detection...
Public sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect," but equally as important is that the private sector organizations reciprocate and understand the how, what and why of the law enforcement/public body process.
This mutual...
Emerging reports now suggest other financial institutions may have been targeted by the same hackers who breached Chase. But how can we be sure? Mark Clancy of the Depository Trust & Clearing Corp. explains why the analysis is challenging.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.