For the first time ever, members of the secretive "Five Eyes" intelligence-sharing group will make a joint public appearance to discuss how they collaborate, sharing a stage in Glasgow, Scotland, during the CyberUK conference. The Five Eyes alliance comprises Australia, Canada, New Zealand, the U.K. and U.S.
Is 'Observability' just a disingenuous rebrand of 'monitoring'? Is it monitoring on steroids? Or, is it the new way to find out "why" (and not just "if") your system, IT or application isn't working as expected?
Today we see th
The U.S. Department of Justice on Thursday released a redacted version of a confidential report prepared for the U.S. attorney general by Special Counsel Robert Mueller, summarizing his two-year investigation into Russian election interference and whether President Donald Trump obstructed the probe.
SOC processes are broken, analysts are feeling the cybersecurity job fatigue, and enterprises are still at risk. SOC leaders often struggle to understand how to make their teams more effective and end up spending their budget on point solutions that add to the problem of data overload. How do you improve security...
From blockchains and surveillance to backdoors and GDPR, a group of leading cryptographers rounded up the top cybersecurity and privacy matters of the day at the cryptographers' panel held at the recent RSA Conference 2019 in San Francisco.
When it comes to browser security, one mistake made by consumers and enterprise alike is that they see the browser as a one-way window into the internet. The reality is quite different - and potentially costly if overlooked, says Pieter Arntz of Malwarebytes.
In an all-digital world, ID theft is everywhere and is holding companies back. Companies in every industry are seeing a very real and significant impact on their goals. ID fraud isn't just a nuisance; it's a true threat to the business. Traditional identity verification (IDV) methods are increasingly compromised and...
"The price of fraud keeps going up, costing the global economy $41.6 trillion per year. Recognizing the four degrees of fraud is the first step in keeping fraudulent users off your platform. It's time to take a new approach to ID verification. Find out how, read our infographic.
What should you consider when choosing an identity verification provider? From technical requirements to key metrics and user experience, there's so much to think about.
That's why we've made a checklist for you - to help you evaluate all the different identity verification solutions.
Download the checklist to...
Biometric technology has been gathering traction and is becoming almost ubiquitous across a range of industries and applications. But how does it work, what are the benefits, and what do businesses need to look at when implementing the technology?
Watch this Q&A with Onfido's biometrics expert, Susana Lopes, to...
When it comes to user onboarding, there's a tension between security and convenience. Try to shortcut security, and you'll pay the price. But add too much friction and you'll struggle to scale. So how can you optimize your user experience to introduce just the right amount of 'friendly' friction and unlock...
Identity theft is the fastest growing crime in the US. Globally, 1 in 60 online transactions are fraudulent. And if you don't know who your customers are, you can't onboard them to your platform.
Download this ebook to learn more about the future of digital onboarding.
An Australian company that markets a smartwatch that lets parents monitor their children shut down its service on Monday after researchers revealed hackers could track a child's location, spoof the location, add themselves as a "parent" and view personally identifiable information associated with the account.
In the past, the relationship between cybersecurity and privacy has been uneasy and even ill-defined. But today, in the post-GDPR era, the relationship is clear, and so is the legal and compliance path forward, says David Ruiz of Malwarebytes.
The 2019 State of IBM i Security Study analyzed 244 servers and partitions, drawing participants from finance, retail, manufacturing, and many other industries. This is not a recurring study of the same systems each year, but general trends are apparent.
The study, now in its 16th year, reveals concrete, impartial...