Brokerage account takeover, supply chain attacks, destructive attacks and those that seek to manipulate time or time stamps are among the latest threats uncovered in the new Modern Bank Heists report authored by Tom Kellermann at VMware Carbon Black.
Adopting the "zero trust" model is essential to ensuring security as organizations use more IoT devices, says Fred Streefland of Hikvision, a Chinese company that manufactures video surveillance equipment. He addresses misconceptions about the model.
Synthetic identity fraud is a pervasive yet ill-defined crime – hard to define as well as to detect. Greg Woolf of FiVerity discusses a recent initiative by the Federal Reserve in Boston to better define and therefore better manage SIF.
Four editors at Information Security Media Group - Tom Field, Anna Delaney, Mathew Schwartz and Tony Morbin - review this week’s most important cybersecurity developments, from nation-state threats and supply chain risk, to combating ransomware and adopting a zero trust strategy.
Don’t call it a product, and don’t try to create a standard around it - "zero trust" is a strategy, says John Kindervag, the former Forrester analyst who created it. As he steps into his new role at ON2IT Cybersecurity, his goal is to help make zero trust easy to implement.
To mitigate the fraud risks posed by synthetic IDs, banks should use consumers' devices to help with authentication, says Karen Boyer, vice president of financial crimes and fraud intelligence at People’s United Bank, based in Connecticut.
He started his cybersecurity career as a pen tester. As a result, Gong CISO Jack Leidecker retains an affinity for the tech community and emerging tools. He shares insight on this passion and his drive to ensure security’s role in business enablement.
Many IoT devices sold today don’t meet minimum security standards, and much effort is being devoted to making IoT devices more secure. IoT expert TJ O'Connor says consumers are largely in the dark when trying to evaluate the security stance of IoT devices.
In this era of "work from anywhere," identity and access management solutions are challenged more than ever. What are the strategies and solutions recommended by top CEOs and CISOs in the cybersecurity sector? An expert panel weighs in.
Jamil Farshchi has been there. As CISO of Equifax, he knows what it’s like to be a victim of a high-profile cyberattack. And he knows breached companies have a choice: "Are they going to be a force for good by helping the rest of the industry learn from their experience?"
The Good Health Pass Collaborative is developing a road map for digital health passes that international travelers could use to prove they have been tested for COVID-19. Dakota Gruener, executive director of ID2020, which launched the project, describes the effort, including privacy-protection measures.