More than two-thirds of survey respondents say they take a balanced approach - business, customers and compliance - investing in fraud prevention technology. So, why do they also report customer friction among their top challenges? BioCatch's Raj Dasgupta analyzes the results of the new Fraud Transformation Survey.
Dr. Frances Undelikwo, divisional head of IT and operational risk management at Fidelity Bank in Nigeria, says she found her passion by trying out different departments and fields under information security. She discusses her career path and current role.
In this exclusive interview, Martin Cook, Senior Solutions Engineer with ReliaQuest, discusses how to reduce complexity, increase visibility and tap into new resources to enhance your own abilities to detect, investigate and respond to attacks.
How does one begin to secure the digital transformation journey in two legacy enterprises? Kush Sharma, principal for Sharma and Company and former CISO for the city of Toronto, shares his experience and offers advice on investing in and integrating technologies.
You can't decrease the motivation of ransomware attackers. But you can curb their success by bolstering your own enterprise's approach to access, credentials and privileges. Morey Haber and James Maude of BeyondTrust share insights on ransomware defense.
An effective security control program should focus on people and processes and not just technology, says Ashwin Ram, cybersecurity evangelist with Check Point. Ram also shares his insights on data breach trends.
CyberEdBoard Executive Member Dr. Deepak Kumar gives the keynote speech at ISMG Virtual Cybersecurity Summit Asia: Financial Services. The session addresses how banking and financial services organizations can take steps to invest in operational speed, drive value from new investments, enhance their training and...
CyberEdBoard Executive Member Charmaine Valmonte speaks at the ISMG Virtual Cybersecurity Summit Asia: Financial Services. Topics include our new realities and emerging technologies, why we need a cybersecurity maturity model, and the importance of identity management and governance.
CyberEdBoard member Maria Filomena Gibe speaks on a panel at ISMG Virtual Cybersecurity Summit Asia: Financial Services. The panel discusses:
• How "zero trust" has made security a business enabler;
• Building a multifactor authentication model based on zero trust;
• Building a zero trust framework aligned...
Thought leadership is crucial within the threat intelligence sharing community and developing technologies that easily share and use threat intelligence, as a nation we can help agencies identify and stop attacks aggressively and quickly.
During the podcast, you can anticipate a healthy discussion on:
The value of...
Tomislav Pericin, Co-founder and Chief Software Architect for ReversingLabs, discusses the evolution of supply chain attack sophistication, and why both software builders and buyers need to change how they defend against attack surface area risks.
It was one thing to secure employees in a central office; quite another to secure them at home. What happens now in the hybrid workforce? Mike Anderson of Netskope outlines the key cybersecurity recommendations from his 'Return to Work' playbook.
Applications, the network, security - they all have been affected by the seismic changes of the past year, and they drive the need for adopting the "zero trust" model. Zscaler CEO Jay Chaudhry and Nexteer Automotive CISO Arun DeSouza discuss the necessary mindset shift.