Since mobile banking usage is set to grow exponentially, banks must overcome structural challenges and
reconcile consumers' appetite for ease of use with the desire for greater security.
There are a growing number of fintech startups that have been able to overstep the legacy cost structures
and regulatory...
For over a decade, a crucial part of fraud detection has been assigning an identity to every laptop, tablet, and mobile device that accesses a website or app. Such a fingerprint is a representation of hundreds of different device-specific values taken from an end user's device.
Today's device fingerprinting...
One of the leading mobile-based financial services targeted at millennials approached Simility to help fight fraud. Simility provided an end-to-end solution which included customized models for their specific needs.
Fraudsters were using the company's customer accounts to funnel money via stolen identities. But...
Compliance comes down to behavior. Ask yourself: are your users utilizing protected data sets in an appropriate manner? While most organizations focus on establishing security controls around access, the true test of compliance revolves around visibility into what users do after accessing data.
In the financial...
At its core, compliance for HIPAA is simply about maintaining patient privacy by ensuring your users appropriately access and use patient data. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed.
The challenge, however, is the lack of visibility into what users do with...
Eduard Goodman, global privacy officer of CyberScout, doesn't like the disorganized way most cyber incidents are handled now. Instead, he would like to see a more project management approach. Here are the benefits he foresees.
According to the Cisco 2017 Annual Cybersecurity Report, over one-third of organizations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent.
Investing in good security is a must, but so is spending wisely to ensure you get the maximum impact from...
When it comes to fraud, enterprise data has a story to tell, and it's up to security and fraud leaders to know how to interpret that story.
Download this whitepaper to learn more about:
How to recognize fraud in your environment;
How to quickly spot anomalous behavior;
Best practices for using machine data and...
Technology evolves at a breakneck pace. This has felt true for decades, but the reality is, the pace of change today is unprecedented and accelerating. Never before has it been so challenging to stay current on which technologies are in
demand, which are on the horizon, and which are fading
Download this...
Ready or not, General Data Protection Regulation (GDPR) will be enforced beginning on May 25th, 2018, and failure to comply could cost your company millions. If you think this only affects the security and IT ops teams in the EU, think again. GDPR will have global business impact and it will affect your organization...
Featuring "Speed and Innovation Drive CIO Success", a Forrester Report brought to you by compliments of Pluralsight, highlights how many organizations have used a "wait and see" approach to digital transformation and the adoption of technology.
This approach won't work anymore. For organizations to compete today,...
Gartner, an information technology research and advisory company, provides trusted insights on the latest industry trends that affect key business decisions for IT ops departments and companies as a whole.
Their annual CIO Agenda Report summarizes data from a survey of thousands of CIOs worldwide and analyzes
the...
New York State Attorney General Eric Schneiderman, who resigned on Monday in the midst of a personal scandal, was known for being one of the nation's toughest state enforcers in cases involving breaches, privacy and fraud. So what happens next?
Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter.
Download this report to learn more about:
What the scope and cost of an attack is in various industries;
How organizations are protecting themselves in various industries from...
Twitter has apologized after it discovered that it had been inadvertently storing users' passwords in plaintext in an internal log, potentially putting them at risk. Twitter has blamed a bug for the fault and recommends all users change their passwords immediately.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.