Stung by signs of Russian influencing of the 2016 presidential election, the FBI is working with social media companies to bolster cybersecurity in advance of the 2018 mid-term election. Elvis Chan of the FBI describes these efforts.
Rob Rendell spent more than a decade in financial services. Now he has joined IBM Trusteer to help financial institutions fight fraud. How will his experience help his customers get their arms around the total cost of fraud?
Managing third-party risks is more critical than ever, says Tom Turner of BitSight Technologies, who discusses the urgency of communicating that to the board.
For the past year, the buzz about artificial intelligence and machine learning has been overwhelming. But Ricardo Villadiego of Cyxtera sees promise in how these technologies can help organizations fight back against fraudsters.
Organizations are increasingly incorporating open source code elements into their software development to accommodate agile development methodologies and swift go-to-market requirements, but not many are addressing the security concerns that follow, says CA Veracode CTO Chris Wysopal.
Department of Homeland Security Secretary Kirstjen M. Nielsen warns that the U.S. will more aggressively move to punish those who conduct cyberattacks. Plus, the department plans to soon unveil a new cybersecurity strategy. Complacency, she says, "is being replaced by consequences."
Fraudsters are now gingerly testing the waters in central and Western Europe with attacks that drain cash machines of their funds, according to a trade group that studies criminal activity around ATMs. Jackpotting in the region rose 231 percent in 2017 compared to 2016.
At the opening of the RSA Conference in San Francisco, executives from RSA, Microsoft and McAfee offered an update on the state of cybersecurity, focusing on WannaCry. They called for the industry to work more closely together to protect not just individuals but also society.
While U.S. agencies and enterprises increasingly understand the nation-state cyber threat, they are woefully unprepared to respond to a sustained attack, says former State Department adviser Morgan Wright. What are we overlooking?
When it comes to building an effective cybersecurity team, it isn't just about acquiring the right technology and business skills, says LinkedIn CISO Cory Scott. It's also about obtaining the right people who have defined their own personal narrative.
Social engineering attacks, including ransomware, business email compromise and phishing, are a problem that can never be solved, but rather only managed via a continued focus on security awareness training, says Stu Sjouwerman, CEO of KnowBe4.
It's a quandary: How does one convey the urgency of cybersecurity without falling into the trap of spreading fear, uncertainty and doubt? Diana Kelley, cybersecurity field CTO at Microsoft, shares strategies.
What are the strengths and weaknesses of U.S. federal security strategy? Sean Frazier of Duo Security, provides an assessment and addresses why adaptation to the cloud is paramount.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.