Effective security and risk programs require not just domain mastery but making security accessible to boards of directors and senior officers, says Karin Höne, the group chief information security and risk officer of South Africa-based multinational Barloworld.
Mark Read, head of data breach solutions for TransUnion in the UK, shares insights on the current data breach landscape, including how businesses should respond to a data breach in order to reduce its impact. "The most successful responses often include the offer of a remediation solution," he says.
Ten years from now, "the ability to transact on a global basis will continue," says Nick Coleman, CSO, real-time payments at MasterCard, who adds, "Maybe my car will buy stuff for me." Coleman discusses the future of digital payments and the technologies that can help secure that future.
in the Frost Radar™ US Healthcare Cybersecurity Market
More than 90% of all healthcare organizations reported at least one security breach over the last 3 years. Robust cybersecurity has become a top priority and an essential requirement for all C-level healthcare executives. The most crucial challenges related to...
The Nigerian Police Special Fraud Unit says it busted a criminal syndicate, preventing cyberattacks against at least 10 banks in the country. The alleged mastermind was caught by the police, along with two alleged gang members, and another alleged member absconded, the police say.
If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
Understanding the challenges that increase cyber risks faced by the financial industry is crucial to be resilient against cyber threats.
In this blog you will learn how the below challenges can be addressed in a holistic approach:
Continuous Digital Transformation and Innovation
Complicated Legislations and...
Since existing security products are not adaptable to the way applications are being developed and pushed today, continuous security testing proves an ideal solution that helps in staying ready for any threat that is coming your way.
Download this datasheet to learn:
Why you should continuously test and tune your...
In the today’s digital world, when so much of our lives are online, identity verification and authentication are critical to addressing fraud-related risk management challenges. To prevent fraud and protect your business and your customers, you must be certain the people you are dealing with are who they represent...
In the today’s digital world, when so much of our lives are online, identity verification and authentication are critical to addressing fraud-related risk management challenges. To prevent fraud and protect your business and your customers, you must be certain the people you are dealing with are who they represent...
Today’s sophisticated cyberattacks combine multiple tactics that include social engineering, zero-day malware and 3rd party OAuth app abuse. Threat actors employ tactics across email, cloud and web that target specific people in your organization to breach your environment and access sensitive data. Hybrid work...
From the billions pumped into unemployment and other economic relief programs during the pandemic to competitive marketing campaigns designed to increase customer acquisition, fraudsters have never had a better incentive to commit new account fraud. This session will highlight the problems financial institutions are...
As human beings, one of our fundamental identifiers is our voice, which can allow us to quickly and privately connect to, enter, and unlock our technology-filled world. In today’s context, allowing people to unlock those worlds safely and privately is a challenge.
This report will look at:
How those systems that...
Skyrocketing attack rates, double and triple extortion, increasing ransom demands… cybercriminals are inflicting pain in every way imaginable when it comes to today’s ransomware attacks. And you need to be prepared to protect your network, NOW.
Find out the steps you need to take to minimize damage to your...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.