RSA's most recent Quarterly Fraud Report shows that "newsjacking" is increasingly empowering phishing attacks, says Angel Grant, RSA's director of identity fraud and risk intelligence. The report also shows a continuing surge in mobile app fraud.
For at least the third time in recent months, a mobile fitness app maker apparently has exposed consumers' sensitive personal information. The latest app to expose data: PumpUp.
While board level executives understand the concepts and terms used in network security and perimeter security, application security, as a concept and discipline, is not quite firmly defined. AppSec is much different than other security domains, so applying the standard methods does not necessarily address the unique...
What are the risks and damages from DDoS and web application
attacks? How have DDoS attacks changed? What motivates web
application attackers?
Download this infographic to learn the answers to these questions
and more.
In viewing this content, we would like to share your data
with the content...
As attackers get increasingly sophisticated in reverse-engineering applications, it is imperative that enterprises secure trusted applications that are reaching back into the datacenter from beyond the perimeter, says Rusty Carter of Arxan Technologies.
What matters most, right now, to the information security community? At RSA 2018, RSA's president said WannaCry was a wakeup call for vulnerability and risk management. Other experts see artificial intelligence, machine learning and secure coding as hot trends.
Have you heard the statistics supporting the fact that every enterprise - from airlines and appliance manufacturers to banks and hospitals - needs to make a digital transformation? By 2020, 72% of the world's employees will be mobile workers, more than 20B devices will be connected to the internet of things and we'll...
Machine learning is revolutionizing fraud prevention. Online businesses everywhere are discovering how this innovative technology increases revenue, while minimizing risk.
But how can it work for you?
Download this whitepaper to learn more about:
Why machine learning excels at preventing all types of fraud and...
The damage done by fraud and abuse isn't always easy to quantify. But getting clear on the numbers will help you understand the health of your business, measure your success, get buy-in for resources, and measure the effectiveness of your fraud tools.
Download this worksheet to learn more about:
The various types...
Account take-over (ATO) happens on some of the most major social networks and to really well-known celebrities, so if it can happen to them, it can happen to you and your organization. When people use insecure passwords that are easy to crack, hackers are able to gain access to the victim's account and change the...
Organizations are increasingly incorporating open source code elements into their software development to accommodate agile development methodologies and swift go-to-market requirements, but not many are addressing the security concerns that follow, says CA Veracode CTO Chris Wysopal.
Account opening continues to transition from physical to digital channels, which means financial institutions and other organizations must optimize the digital experience in order to compete. At the same time, fraud is on the rise because of the same benefits enjoyed by consumers: convenience, speed, and ease of...
As businesses surge ahead with agile development processes, cloud and DevOps, traditional security can no longer be the show stopper. Security needs to integrate with the DevOps process to ensure responsibility is shared and security is built in.
DevSecOps enables application security testing by the developer and by...
Cloud providers have transformed from offering a fringe platform utilized by courageous companies on technology's leading edge into a cloud-first, standard, go-to approach for running all sorts of business-critical systems. According to IDC, nearly 50% of IT infrastructure spend will be on private/public clouds by...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.