As an assistant U.S. attorney in northern Georgia, Nathan Kitchens has seen scores of cybercrime cases - especially ransomware attacks and business email compromises. And he has two words of advice to potential victims: Be prepared.
As fraudsters continue to improve their email spoofing with better socially engineered schemes, business email compromise attacks will become more successful, says Denyette DePierro of the American Bankers Association, who discusses how banks can help customers avoid becoming victimized.
Organizations have more endpoints today than ever, and securing those endpoints is challenging, because it's rare that any one organization is responsible for all the endpoints that touch its network and servers, says Mike Spanbauer, vice president of research and strategy at NSS Labs.
As attorney general of the state of Georgia, Christopher Carr sees the rise of cybercrime. But he also sees the growth of the cybersecurity industry in response to criminal threats. How does he envision his role in protecting the state?
More than15 years ago, the nation of Estonia rolled out a digital identity program for all citizens, allowing access to government services, banking, shopping - even voting. What lessons can global businesses learn from Estonia's example? Joseph Carson of Thycotic offers insight.
Many organizations talk about engaging customers to help prevent fraud. Jim Van Dyke, CEO of Futurion, has new ideas for how to best involve customers in fighting fraud in three stages: Prevention, detection and resolution.
So-called "trust attacks" aren't waged for financial gain. They're waged to compromise data, data integrity and to expose sensitive information. Why Darktrace CEO Nicole Eagan says trust attacks will be among our greatest IoT worries in 2017.
New York has become the first US state to issue its own set of cybersecurity rules for financial institutions. What is the potential impact on other states, other industry sectors? Paul Bowen of Arbor Networks shares insight.
Enterprise security leaders largely understand the business problems posed by a lack of privileged access management. But understanding and overcoming the obstacles to deploying a successful PAM rollout? That's the real challenge, says Alex Mosher of CA Technologies.
Bryce Austin, a former technology lead at Target during the retailer's massive November 2013 breach, says the role of the CISO needs to evolve, ensuring that cybersecurity is balanced with the overall needs of the company. He claims tying the CISO's performance to the company's revenue is the best way to do that.
Card-not-present fraud rates in the U.S. have not skyrocketed like some experts predicted in the wake of EMV, according to Visa. And Visa's Margaret Reid says that's likely because most large e-commerce merchants in the U.S. are using sophisticated fraud prevention tools that have so far kept fraud rates at bay.
Concern about privacy spurs consumers to work more closely with their banks, says Robert Zerby, vice president and financial crimes manager within the Community Banking Risk Management division at Wells Fargo Financial Crimes Risk Management.
Park a police car beside a road, and traffic slows down. David Pollino of Bank of the West takes a similar approach to mitigating the insider threat at the institution. What is the bank's 'noisy' program, and how does it discourage rogue behavior? Pollino explains.
When she first joined the Los Angeles County district attorney's office, Maria Ramirez prosecuted street gangs. Now she's cracking down on cyber gangs and is opening her case file to share lessons learned from cases involving business email compromise and ransomware.
Over the past year, fines levied by various regulatory agencies against breached entities have helped to shape and clarify what cybersecurity attorney Joseph Burton calls the cybersecurity standard of care - a standard for reasonable security that courts will turn to when determining liability and fault in the wake of...