The new year has kicked off with a flurry of data security company acquisition activity; five deals have already been announced. Companies making acquisitions are striving to improve their secure access service edge - or SASE - posture, enter new markets or bolster their technology portfolios.
Many companies claim to be successfully using artificial intelligence for security, but the use cases are still not convincing because the technology is incapable of detecting unknown malware, says Guy Sheppard of SWIFT.
In this eBook learn how organizations can achieve cyber resilience in an increasingly digitized world. Gain quick tips on how to get the board’s attention and approval on CyberSecurity investments. And finally, deep dive into how to combat cyberattacks effectively with a CyberSecurity Incident Response Program.
Like you, cybercriminals are on their own digital transformation journey. Trends like remote work, Internet of Things (IoT), bring-your-own-device (BYOD) and cloud initiatives have given hackers new ways to infiltrate your organization by exponentially expanding the attack surface. Technologies like artificial...
"Has anyone witnessed any examples of criminals abusing artificial intelligence?" That's a question security firms have been raising. A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging
As synthetic ID fraud in the financial services sector continues to rise next year, organizations must use new technologies to mitigate the risks, says Saif Nawaz of Meridian Credit Union in Canada.
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
Twenty financial institutions are collaborating to identify how machine learning can be used to detect synthetic ID fraud, says Greg Woolf, CEO at the security firm FiVerity.
With polymorphic attacks making up more than 40% of phishing campaigns designed to grab user credentials, the stakes are high for organizations around the globe. For many cybersecurity teams who lack bandwidth, finding the full scope of these attacks to quarantine is challenging and time consuming. Even worse,...
The Cofense Intelligence Team analyzes millions of emails and malware samples to understand the phishing landscape. Our most recent Phishing Review highlights tactics, techniques and procedures of attackers in July-September 2020, observed by our Cofense Intelligence team.
Download Cofense's Quarterly Phishing Review...
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
There's a lot of talk about advancing the anti-money laundering arsenal to the next level, sometimes referred to as next-generation AML, AML 2.0 or AML 3.0. Whatever you call the next wave of AML technology, it's about solutions that draw on such advances as robotics, semantic analysis and artificial intelligence...
The future of work remains unpredictable, and organizations must rethink their approach to security to achieve much-needed adaptability and resilience. In this session, learn how the Darktrace Immune System addresses the challenges our next normal will bring with AI augmentation, Autonomous Response, and unified...
Cyberattacks have rapidly evolved since the advent of online transacting almost 25 years ago, with attackers continually escalating and refining their techniques to protect their illicit revenue streams. More recently, cybercriminals have been weaponizing AI tools to easily bypass traditional security controls and...
eKYC not only enables financial institutions to onboard their customers remotely without the need for face-to-face interactions, it has also provided consumers a more flexible option to perform and manage their own transactions anytime, anywhere.
Before deciding whether to build your own on-premise eKYC system or...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.