Adam Turteltaub, chief engagement and strategy officer at the Society of Corporate Compliance and Ethics, says compliance teams should create a dashboard of data that will help keep track of actions taken by staff members who are working remotely.
To improve compliance efforts, organizations can turn to a number of technologies, including data analytics. Two experts share their views on making the most of automation and integration tools.
Authorized push payment fraud is expected to continue to surge in 2021. PJ Rohall, co-founder of the website About-Fraud, says behavioral analytics can play an important role in mitigating the risk.
A quarter of a century of digital transformation, accelerated by the COVID-19 pandemic, has led us into the data age. However, a new global survey finds that most organizations are not ready for these new waves of data emerging from new digital technologies.
Taking a closer look at organizations in France. Most are...
To help prevent fraud, banks must leverage technologies such as behavioral analytics, device biometrics and one-time passcodes, says Nancy Guglielmo, senior vice president at the Bank Policy Institute.
As small businesses apply for loan forgiveness under the Paycheck Protection Program, and banks who made the loans on behalf of the Small Business Association investigate whether any were fraudulently obtained, fraud-detection technologies will play a critical role, says Frank Mckenna of Point Predictive.
Shocking but true: 44 percent of East-West traffic is not encrypted. If you ever needed a reason to evaluate your own network, our new TLS research report is jammed with more numbers that will motivate you to do so. Researchers studied 275 billion data flows to reveal real-world metrics of SSL/TLS protocol usage, and...
In this whitepaper you will learn more about data classification, the advantages of automated and user-driven data classification, how to prepare for a data classification project and most importantly the peripheral benefits of involving the user in security.
True predictive analysis is difficult - and it sometimes takes years of learning and data modeling to get it right, says Derek Manky, chief of security insights and global threat alliances at Fortiguard Labs.
Data security is on everyone's mind these days, and for good reason. The number of successful data breaches is growing thanks to the increased attack surfaces created by more complex IT environments, widespread adoption of cloud services and the increasingly sophisticated nature of cyber criminals.
This paper...
The Forrester Wave��: Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.
Download the report to learn why Forrester...
To better serve the public good, modern public agencies across the globe are bringing data to every aspect of their work. From municipal governments, public education and healthcare to defense, law enforcement and cutting-edge scientific research, Splunk helps public sector agency leaders ensure mission success by...
This case study discusses Quanta Services' experience with security analytics methods. Quanta is a leading specialty contractor with a large and highly trained skilled workforce. The security logistics of the company's geographic footprint spans North America, Latin America, and Australia.
Read this case study to...
In an environment of massive security data, overwhelmed and hard-to-find security experts, and a do-it-yourself approach to managing an analytics infrastructure, most CISOs would be happy to find a better method.
Read this guide to learn:
How to investigate and hunt at the speed of search;
The salient needs and...
As enterprise infrastructure evolves from captive on-premise to IaaS/PaaS/SaaS platforms, coverage and visibility have emerged as critical barriers to security operations. Cloud providers who focus primarily on delivering security monitoring limit visibility into modern attacks that commonly span on-premise and hybrid...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.