Accidentally careless employees are the biggest cause of incidents involving data loss, responsible for almost 25 percent of all breaches.
Given that employees are the first line of defense against socially engineered schemes, such as account takeover, new account fraud and other crimes, doesn't it make sense to...
Organizations spend millions every year to prevent attacks, yet they have very little insight into the actual cyber risk they're facing. Without that insight, it's difficult to know where to focus resources or measure the value of any security investments.
This presentation discusses how you can build your own...
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
As businesses evolve to support a complete digital experience, a challenge has emerged to one of the most basic questions of doing business: How can I truly trust I know my customer?
In the world of data breaches and identity theft, legacy programs of identity proofing and authentication do not instill a high level...
Despite increasing investment in cyber security tools for the data center, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat: accidental loss, misdirected content and the malicious insider. These types of incidents contribute up to 80% of all breached...
As director of the NSA for nearly a decade, Gen. Keith Alexander (retired) saw the nation-state cybersecurity threat evolve from a nuisance to a sophisticated adversary. Now, as CEO of IronNet Cybersecurity, he's spearheading a defense.
As the head of DevSecOps at Intuit, Shannon Lietz tracks the real-world tactics, techniques and procedures hackers use against her organization. She's cataloged the top 10 application security attack techniques being used against Intuit, which differ markedly from the OWASP top 10.
Hacking is a global phenomenon, says Liv Rowley, an intelligence analyst at Flashpoint who's been tracking the rise, fall and mysterious reappearance of Cebolla Chan 3.0, the Latin American region's top Spanish language hacking forum.
"Cyber fatigue," the result of being constantly under attack, leads to security mistakes, says Richard Ford of Forcepoint, who discusses what can be done to address the issue.
A critical element of managing third party risk seems obvious but is often lacking - knowing who your third-party partners are. Kelly White of RiskRecon discusses risk management best practices.
DNS is not well understood as a signal and control point in cybersecurity, says Andrew Wertkin of BlueCat Networks, who discusses key steps to change this perception.
Cryptomining is in its infancy, but it could evolve to be a valuable revenue stream for digital content. Hacker House's Matthew Hickey and Jennifer Arcuri outline its potential.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.