Four years ago, it was argued that software would replace Tier One Security Analyst roles across the industry. But at Secureworks, we view the infusion of automation into the SOC differently. Kevin Hanes, Secureworks' Chief Operations Officer, believes the SOC of the future will bring together the best of data science...
The new year has kicked off with a flurry of data security company acquisition activity; five deals have already been announced. Companies making acquisitions are striving to improve their secure access service edge - or SASE - posture, enter new markets or bolster their technology portfolios.
Many companies claim to be successfully using artificial intelligence for security, but the use cases are still not convincing because the technology is incapable of detecting unknown malware, says Guy Sheppard of SWIFT.
Quickly and Easily Deploy a Comprehensive Contact Tracing Solution
Contact tracing is a critical tool for slowing the spread of communicable diseases like the Covid-19 coronavirus, by helping admins identify the individuals an infected person has been in contact with to contain widespread transmission. State and...
Why Start With Identity?
As more government organizations move their citizen services to mobile and cloud-based platforms, ensuring the validity of those benefits claims is more important than ever. Many are adopting an identity centric security model as a framework for prevention of risk and fraud.
How do you protect your customers and employees from rampant phishing and typosquatting attacks that pop up every day? Criminals are banking on the fact that you can't find every single one to block them or warn customers and employees about every new attack. Bolster protects against phishing and typosquatting scams...
First you had 'shadow IT,' then 'shadow cloud.' Now enterprises are encountering 'shadow APIs' - and the lack of visibility into these interfaces is causing new, often overlooked cybersecurity vulnerabilities, says Subbu Iyer of Cequence Security.
"Has anyone witnessed any examples of criminals abusing artificial intelligence?" That's a question security firms have been raising. A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging
As synthetic ID fraud in the financial services sector continues to rise next year, organizations must use new technologies to mitigate the risks, says Saif Nawaz of Meridian Credit Union in Canada.
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
Twenty financial institutions are collaborating to identify how machine learning can be used to detect synthetic ID fraud, says Greg Woolf, CEO at the security firm FiVerity.
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
There's a lot of talk about advancing the anti-money laundering arsenal to the next level, sometimes referred to as next-generation AML, AML 2.0 or AML 3.0. Whatever you call the next wave of AML technology, it's about solutions that draw on such advances as robotics, semantic analysis and artificial intelligence...
The future of work remains unpredictable, and organizations must rethink their approach to security to achieve much-needed adaptability and resilience. In this session, learn how the Darktrace Immune System addresses the challenges our next normal will bring with AI augmentation, Autonomous Response, and unified...
Behavioral biometrics have evolved, and Michael Yeardley of LexisNexis Risk Solutions says the new generation of controls can not only identify the bad guy - but also "the really clever bad guy." He explains how.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.