Russian criminals operating online who want to stay out of jail need only to follow a few simple rules, the primary one being: Never target Russians. So it's surprising that security researchers have uncovered a new ransomware-wielding gang of Russian speakers that includes Russian victims on its hit list.
CISOs are gaining additional discretionary powers to make risk-based decisions, especially as organizations implement the ISO 27035-3 incident response standard, says Khawaja Mohammad Ali, CISO of a large federal bank in Pakistan.
What will be the impact of the leak of investigatory documents from FinCEN - the U.S. Treasury Department's Financial Crimes Enforcement Network? For starters, experts warn that FinCEN reports may reveal sensitive information tied to banks and law enforcement agencies' investigatory tools and tactics.
A ransomware attack that reportedly was directed at a German university but shut down emergency services at an affiliated hospital likely contributed to the death of a patient who needed urgent treatment but instead had to be transported to another hospital, delaying care, according to a news report.
The key components of an effective "zero trust" architecture include multifactor authentication, network segmentation and a defense-in-depth approach, says Dr. Erdal Ozkaya, regional CISO and managing director at Standard Chartered Bank in the United Arab Emirates.
Traditional methods of signing forms and documents are moving from paper to paperless, and banks are increasingly turning to e-signatures to better serve customers that are looking for modern, digital, convenient banking services.
This guide gives a comprehensive overview for how the digital route provided by...
From account opening to HR, banks and other FIs have thousands of forms that can use e signature. While demand for e signature is high among all lines of business, the question is: where to start? And from there, what is the best way to extend e signatures across the enterprise?
To learn which processes are the best...
Nowadays, companies are striving to provide their customers with the easiest, fastest, and secure user signing experience in the channel or device of their choice.
How do you build an optimal user experience across all channels, while ensuring compliance?
Download this white paper and discover best practices to...
Financial Institutions (FIs) need strong security to combat fraud, but they cannot negatively impact the user experience.
To solve this challenge, FIs are increasingly turning to the emerging technology of behavioral biometrics.
Download this whitepaper to learn:
What are Behavioral Biometrics?
What are the...
Fraudsters' methods of attack are evolving. Download this guide to learn how to detect account takeover attacks with adaptive MFA, risk analytics, and machine learning.
In this eBook, you will learn:
6 fraud techniques that lead to account takeover attacks;
How to help prevent attacks on the login process,...
A flaw in how contactless cards from Visa - and potentially other issuers - have implemented the EMV protocol can be abused to bypass PIN verification for high-value transactions, ETH Zurich researchers warn. But Visa says the exploits would be "impractical for fraudsters to employ" in real-world attacks.
Ransomware continues to pose a "significant" threat, and email remains one of the top attack vectors being used by both criminals and nation-states, Australia's Cyber Security Center warns in its latest "Cyber Threat Report," which urges organizations to improve their defenses.
The eHealth Initiative and the Center for Democracy and Technology are seeking feedback on their draft privacy framework that addresses gaps in legal protections for consumer health data falling outside of HIPAA's regulatory umbrella, says eHI CEO Jennifer Covich Bordenick.
European banks are not ready to meet the Dec. 31 deadline to comply with the PSD2 regulation, which requires strong customer authentication when providing API access to banking platforms, says Dr. Steven J. Murdoch, a principal research fellow at University College of London.
The Reserve Bank of India's draft of a framework for new self-regulatory organizations, including one that would help oversee payment system operators, fails to adequately address security issues, some observers say.