The goals of cybercriminals using automated bots are always the same - account takeovers, fake account creation, theft of unused gift card balances, and similar types of criminal activity that disrupt normal business operations.
This report presents the results of an in-depth survey on current practices that larger...
Estimating potential cyber intruder activities and what attack path they may take to access our critical assets is important in understanding how we prioritize our security measures.
This whitepaper focuses on an optimized method for automatically assessing those attack routes taking into account the challenges found...
Small and midsize organizations are no less vulnerable to cyberattacks than large enterprises. Dan Smith of Zeguro outlines an approach for these organizations that fuses cybersecurity with insurance.
Good bots vs. bad bots. How can you manage them if you can't tell the difference? Bad bots constitute one of the gravest threats to websites, mobile applications and APIs owned by businesses. Bots cause a range of business problems, such as account takeover, application DDoS, API abuse, web scraping, spam creation,...
A recent report from Osterman Research has shown that while Office 365 has many benefits, its broad, one-size-fits-all approach means not all information security scenarios and use cases are addressed. As a result, organizations are spending 37% of the average Office 365 deployment budget on complementary third-party...
Most companies have huge gaps in their cyber defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: Assume Breach.
Join Roger A. Grimes, a 30-year computer consultant, for this webinar where he explores the latest research on what's wrong with current defenses and how...
The NIS Directive, effective since May 2018, aims to standardize the security practices of Essential Services entities and their digital service providers to better defend against cyber attacks. Privileged Access Management (PAM) is a critical aspect of cyber defense, and responds to many of the NIS Directive's most...
The 10th annual IRISSCERT Cyber Crime Conference, to be held Thursday in Dublin, promises to round up crime trends and also offer updates on incident response lessons learned, spam fighting and even cybersecurity essentials for children.
When it comes to bots, evolution is the name of the game. Nefarious bots are one of the fastest growing and fluid threats facing cyber security experts today. In fact, the information in the eBook may be out of date by the time you even read it - that is how dramatic the evolution is.
So, does that mean that you...
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation-states, cybercrime gangs or lone...
While the modern enterprise embraces digital technology, it is also at risk of cyberattacks. In this guide, "The Essential Guide to Security," we map out how organizations can use machine data for specific use cases and get started addressing threats and security challenges.
Download your complimentary copy to...
Smartphone cameras and microphones act as the eyes and ears of the digital age, capable of capturing the smallest audio and visual details in high-definition clarity. Unfortunately, threat actors have demonstrated the ability to hijack these smartphone components, using them to gain valuable insights about targeted...
Brett Johnson, referred to by the United States Secret Service as "The Original Internet Godfather" has been a central figure in the cybercrime world for almost 20 years. He founded and was the leader of Counterfeitlibrary.com and Shadowcrew.com. Working alongside the top cyber criminals of our time, he helped design,...
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation states, cybercrime gangs or lone actors. Join...
Hear from the FBI on the tenets of cyber defense and current trends in cybercrime. Then, learn from Shape Security about a specific type of cybercrime: imitation attacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.