Data Protection May 9, 2018 A Whole New Ballgame: Applying the Immune System Approach to Sporting Event Cybersecurity 3 min read - Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity.
April 23, 2018 Human-Centered Vulnerabilities Now Outpace Automated Cyberattacks 2 min read - According to a new report, cybercriminals now prefer to leverage human-centered vulnerabilities rather than launching automated attacks.
April 12, 2018 Twenty-Seven Percent of Employees Fail Social Engineering Test, Suggesting Need for Better Cybersecurity Training 2 min read - According to a recent study, 27 percent of employees failed to respond appropriately to a simulated phishing exercise, underscoring the need for better cybersecurity training.
Fraud Protection April 12, 2018 Social Engineering: A Trick as Old as Time 4 min read - Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.
CISO March 30, 2018 Five Surprising Reasons to Invest in Better Security Training 3 min read - Security training programs should go beyond the basics and address why phishing attacks, social engineering schemes and other insider threats impact employees personally.
March 27, 2018 Law Enforcement Conducts Largest Coordinated Elder Identity Fraud Sweep in History 2 min read - The U.S. Department of Justice recently conducted the largest sweep of identity fraud cases aimed at elderly citizens in the nation's history.
Fraud Protection March 6, 2018 February’s Top Cybersecurity News Stories: Nice Phish You Got There 3 min read - Last month's cybersecurity news cycle featured a tricky cryptocurrency-stealing Trojan, targeted phishing attacks, interesting insights about millennials' identity protection habits and more.
February 27, 2018 New Incident Response Study Reveals More Than Half of Attackers Use Social Engineering to Target Organizations 2 min read - A new study on incident response revealed that more than half of external attackers use social engineering in targeted campaigns against organizations in various sectors.
Fraud Protection February 8, 2018 Why Device ID May Not Be Enough to Stop Fraud 3 min read - To defeat increasingly sophisticated fraudsters, security teams should pair their fraud detection tools with a device ID spoofing mechanism that automatically adapts to new threats.
Risk Management December 11, 2017 Revisiting the Top Security Threats of 2017 3 min read - Many of the security threats we noted at the start of 2017 gripped the public's attention during the past year, foreshadowing major shifts to come in 2018.