Both security intrusions and fraud events are on the rise worldwide, driven in large part by the "professionalization" of cyber crime. Today, cyber criminal organizations often function much like their enterprise targets, complete with executive staffs, strategic plans and ROI targets. The extreme sophistication of...
Synthetic identity fraud is more pervasive than most people are aware. Synthetic identities are used to obtain financial services, medical benefits, insurance and rental housing, among other things.
This paper is a primer for understanding synthetic identity fraud. It defines synthetic identity fraud, describes its...
Fraud is a top-of-mind concern for financial institutions, particularly as electronic banking and payments opened a new and relatively porous channel, which organized crime has exploited in some rather complex and profitable schemes. But some leading institutions have found ways to effectively counter the threat...
Financial crime schemes are increasing in frequency and sophistication. Criminals continue to blur the lines among cyber crimes, fraud and money laundering crimes -using the gaps in visibility among payment types, channels and institutional boundaries. Meanwhile, fraud, security and compliance leaders operate in...
All fraud hurts, but when compared to other instruments and transaction channels, nothing has the potential to hurt like check deposit fraud. Account take over is still a major problem in the banking industry, and with recent mass compromise events, the risk is on an upswing.
Download this infographic to...
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber
Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP
cyber breach and how companies are managing the risk of information theft, modification of data
and disruption of business...
What truly affects the cost of a data breach? Ponemon Institute's latest study of over 380 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
In this whitepaper, you will learn:
The seven global megatrends in the cost of data breach...
What truly affects the cost of a data breach? Ponemon Institute's latest study of over 380 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.
Download this whitepaper to learn:
The seven megatrends in the cost of data breach...
This document is intended to be a guide for organizations faced with a ransomware infection. Ransomware is commonly received by the victim through unsolicited email from an unknown sender as an attachment and/or injected into a user's browser session through a web browser vulnerability. As of the start of 2016, there...
Banks spend billions of dollars in defensive measures trying to detect fraudulent transactions and recover funds before they disappear. However, given the increasing sophistication of malware and phishing attacks, and the growing number of threats, many banks are finding that traditional endpoint protections, such as...
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good...
Advanced threats are pervasive, and difficult to detect and contain. A key component to advance threat protection is a sandbox. Before you take the step to enhance your advanced threat protection, it's important to take the time to select the right sandbox for you. Read the Forrester report to find out best practices...
Sandboxing appliances are a critical part of your network's defense, but attackers continue to create malicious tools that your sandbox alone may not be able to detect. Choosing the right security coverage model for your infrastructure is an important step for security your entire network. Learn about common...
As threats grow in numbers, sophistication and impact, network perimeter security is no longer enough to keep sensitive data secure. Internal Segmentation Firewalls (ISFWs) can provide additional layers of protection inside your network boundaries helping to secure critical assets, detect breaches, and shorten...
Industry and government regulations were originally developed to help businesses spot gaps in data security, but for many companies they have the opposite effect. When businesses focus more on avoiding penalties than on developing strong security, vulnerabilities are not prevented they are created.
In this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.