It's been one of the byproducts of 2020's accelerated digital transformation: IT teams are migrating greater numbers of critical applications to the public cloud to gain the obvious business benefits of scalability, availability and agility.
But what's not always so obvious: The cloud security strategies and tools...
It's a given that current economic conditions will result in - at best - "conservative" cybersecurity budgets in 2021. And yet it's also fact that cybersecurity is one of the most important business/government functions, and security leaders are in unique positions to influence policy and spending. How can they best...
A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?
Randy Trzeciak, director of the CERT Insider Threat Center at...
The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust...
The federal government has an entire agency dedicated to homeland security, but who is paying attention to the new, wide-open frontier - the home office? In this Q&A session, Jeff Greene of NIST talks about how to secure the work-from-home environment, including:
How NIST approached remote deployment
Lessons...
The Department of Homeland Security and FBI have their eyes and hands on election cybersecurity, but who's paying attention to securing the actual campaigns? This is the purview of the newly-chartered U.S. CyberDome. In this exclusive session, U.S. CyberDome Executive Director, Brigadier Gen. Francis X. Taylor (Ret.),...
Preceding the outbreak of COVID-19 was a trend across industries to transform the traditional IT stack into a new form of computing, one that was focused on enabling agility and innovation while also delivering cost reduction. This shift sought to leverage public cloud and cloud-like development methods as well as...
Organizations have been building towards a remote workforce for many years but Covid-19 was the single, most compelling event that propelled it forward at lightning speed, creating a myriad of security challenges and risks. Securing a remote workforce has never been more essential for today's organizations. Workers...
This brief will cover the latest trends and developments of financially motivated ransomware attacks. We will discuss the latest intelligence observations pertaining to how threat actors deploy ransomware against various industry targets, as well as the latest developments in how the sophistication of ransomware...
Data is the lifeblood of modern organizations - and modern security operations. Today's SecOps teams must be more data-driven, leveraging automation, machine learning and other tools to quickly identify threats and reduce response times, while freeing up critical engineering and analyst resources. Splunk CISO Yassir...
With changing customer behaviours, fraudsters are quick to find the loop holes in your strategies and systems. How do we tune product development and innovation to effectively stay ahead of the frauders? Learn from different experiences across companies and customers. Discover simple strategies to scale your fraud...
In today's digital world, fighting fraud requires more than just layers of security in the consumer journey. It requires an insights-based approach of interdependent technologies to secure the online experience, before, during, and after the transaction. While it is typical for organizations to have fraud and risk...
As online activity increases and digital footprints expand, so too does the overall digital attack surface. 2020 has been marked by soaring data breaches, leaks, new attack patterns and phishing scams related to COVID-19. The pandemic has compounded fraud and abuse and greatly accelerated consumer digital adoption and...
With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT and security requirements in a rapidly changing environment. In these uncertain times, organizations will need to be prepared for a variety of challenges to ensure secure operations. Organizations will need to...
A poor customer experience and insufficient security in the account opening process has been shown to directly negatively impact long-term customer loyalty, retention and profitability. New technologies, such as digital identity verification, facial comparison, e-signature, liveness detection, biometrics, and more -...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.