A new study from BioCatch, the "2021 Fraud Transformation Survey: Detecting and Preventing Emerging Schemes," asked security leaders at global financial institutions about their perceptions of fraud and risk management.
While offering incredible conveniences, mobile apps are also a vehicle for malicious hackers to obtain sensitive data and personal information. But before we dive into the work of hackers, it is important to understand user privacy.
While the appeal of taking action against an attacker is easy to see, private sector hack back is a very bad idea. We encourage organizations to employ active defense techniques, but limit these to assets you own or operate. Hack back raises a number of concerns, as detailed here..
Pen Test Partners shared news that BrewDog exposed the details of more than 200,000 ‘Equity for Punks’ shareholders for over 18 months, along with many more customers.
Decision-makers need to strike a balance when it comes to spending on cybersecurity technology in a way that still enables corporate growth without leaving the organization overly vulnerable to an attack. Invest too little, and there could be gaps in your cyber defenses. Invest too much, and there could be a false sense of security.
Let's dive into what spear phishing is and how security teams can effectively tackle this very targeted method of digital attack, especially now that hackers are picking up their pace.
As the United States continues to face attacks across critical sectors —
energy and infrastructure, healthcare, and operational technology (OT) —
a cultural shift in cybersecurity is taking place.
Increased reliance on automation and new technologies to assist with meter reading, leak detection and other operational goals have opened a host of attack surfaces. Given the ever-evolving and multi-faceted threat landscape, sharing and collaboration are essential to water and wastewater security and resilience.