Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Bot protection startup PerimeterX raises $57 million more in new financing to fuel its push into new markets globally. [Read More]
The social platform associated the accounts with state-sponsored actors operating out of Armenia, Iran, and Russia. [Read More]
Veteran cybersecurity practitioner and executive Caleb Sima has been tapped to lead security at mobile stock trading startup Robinhood. [Read More]
NEWS ANALYSIS: CrowdStrike said it will shell out a whopping $400 million to snap up a Splunk competitor and present itself as the security data lake for enterprise customers. We look at how the move affects the EDR, xDR and SIEM categories. [Read More]
The U.S. Justice Department indicted three North Korean military intelligence officials linked to cyber-attacks, including the theft of $1.3 billion in money and crypto-currency from organizations around the world. [Read More]
A malvertising attack observed last year had exploited a zero-day vulnerability in WebKit to bypass iframe sandboxing. [Read More]
Enterprise cybersecurity powerhouse Palo Alto spends $156 million to acquire an early-stage DevOps security startup. [Read More]
The U.S. Department of Justice secures a seven-year prison sentence for a Ukrainian man running a lucrative money-mule laundering scheme. [Read More]
Forescout researchers warn that improperly generated ISNs (Initial Sequence Numbers) leave TCP connections exposed to malicious hacker attacks. [Read More]
Microsoft drops a mega patch batch for February: 56 documented vulnerabilities, 11 rated critical, one under active attack. [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Joshua Goldfarb's picture
Josh Goldfarb discusses what enterprises can do to mitigate risk and limit losses account takeover (ATO) fraud, account opening (AO) fraud, and payment fraud.
Idan Aharoni's picture
Proposed Distributed Account Information Certification (DAIC) enables organizations to quickly and securely validate the bank account information of companies before they send payments
Joshua Goldfarb's picture
By implementing controls to prevent fraud and implementing fraud monitoring capabilities, state agencies can greatly reduce the amount of unemployment fraud that happens under their auspices.
Joshua Goldfarb's picture
For any fraud detection solution to be practical, it must be easily integrated into security and fraud operations.
Joshua Goldfarb's picture
Facts, data, and evidence are extremely important to properly detecting, preventing, and investigating both security incidents and fraud incidents.
Joshua Goldfarb's picture
Playing whack-a-mole with malicious code infections, phishing sites, and compromised credentials won’t help an enterprise reduce losses due to fraud.
Laurence Pitt's picture
Although robocalls are a pain for many of us, action is being taken to bring the problem under control.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Josh Lefkowitz's picture
The abundance of compromised card data and other assets available online continues to hinder the fight against card-not-present (CNP) fraud.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.