Restaurant reservation service OpenTable aims to create an amazing dining experience for its millions of users.
Sift Science enabled OpenTable to scale a highly successful digital gift cards program without increasing risk.
Read the case study to learn how to:
Limit manual review;
Move from a manual...
This report uses healthcare-specific data to explore how medical staff and other end users in this industry are performing on cybersecurity assessments. We analyze responses gathered via nearly 85 million questions asked and answered in our Security Education Platform, as well as data culled from tens of millions of...
A group of cybercriminals known for their persistence and precision in executing attacks against banks' ATMs and card processing infrastructures has regrouped despite the arrest of their alleged leader.
Security vendor ProtectWise says a series of operating mistakes has allowed it to gain insight into a group, believed to be affiliated with Chinese intelligence, that specializes in stealing code-signing certificates. The certificates allow for the signing of malware that's unlikely to raise security alarms.
Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter.
Download this report to learn more about:
What the scope and cost of an attack is in various industries;
How organizations are protecting themselves in various industries from...
User-generated content is the lifeblood of online marketplaces and communities -- but content abuse is equally powerful. More than ever, fraudulent content is eroding the digital trust between business and users.
How can you protect your customers and your bottom line from fraudsters?
Download this whitepaper to...
Machine learning is revolutionizing fraud prevention. Online businesses everywhere are discovering how this innovative technology increases revenue, while minimizing risk.
But how can it work for you?
Download this whitepaper to learn more about:
Why machine learning excels at preventing all types of fraud and...
Account take-over (ATO) happens on some of the most major social networks and to really well-known celebrities, so if it can happen to them, it can happen to you and your organization. When people use insecure passwords that are easy to crack, hackers are able to gain access to the victim's account and change the...
Attackers rarely bother with technical sophistication when easy social engineering schemes, such as "hacking" a victim's social network and using it against them, can give them what they want, says Markus Jakobsson, chief scientist at the cybersecurity firm Agari.
British teenager Kane Gamble has been sentenced to serve two years in a youth detention center after he admitted to targeting U.S. officials - including hacking former CIA Director John Brennan's personal AOL email account - as well as dumping personal details for 20,000 FBI employees.
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
The U.S. Federal Government wants its agencies to modernize their IT systems, primarily by maximizing the use of cloud platforms. But IT teams are finding this transformation challenging. Investing in IT modernization can lead to more agility, improved resilience and security and, in the long term, better citizen...
Social engineering attacks, including ransomware, business email compromise and phishing, are a problem that can never be solved, but rather only managed via a continued focus on security awareness training, says Stu Sjouwerman, CEO of KnowBe4.
Email is still the most common attack vector as a preferred method utilized by attackers because of the overwhelming effectiveness. Phishing attacks have only been increasing and evolving to bypass modern security appliances, endpoint protection, and user awareness training.