Credit unions offer unique services to a unique member base - and they face unique challenges when rolling out multifactor authentication across all of their banking channels. Michel Nerrant of Crossmatch discusses how new biometric solutions can meet CU needs.
As third-party companies are introduced into the banking ecosystem, they add a new layer of complexity and potential opportunity for fraud, because they detach the bank from direct interaction with the end user. The new applications and services that are developed expand the fraud potential exponentially, and can...
Financial organizations need to more accurately assess risk in the open banking environment. It's not enough to just get any generic analytics engine that can incorporate data from different interaction channels. A bank's fraud team must be able to identify cybercrime risk, payment risk and customer behavior, in...
Identity and Access Management (IAM) programs are becoming increasingly essential to securing critical systems and data; last year, companies spent $7 billion on IAM, most on protecting user credentials, but almost nothing protecting keys and certificates, the credentials that identify and authorize machine-to-machine...
Is your organization exposed to an attack that misuses SSH keys?
You know that your organization is using SSH to safeguard privileged access. But you may not realize that your SSH keys could be vulnerable to insider and cyber threats.
The majority of those we surveyed didn't. Results from a 2017 study show that...
In a world of constant data breaches, where all consumer PII data is exposed, financial institutions are seeking innovative ways to authenticate customers, verify identity and prevent account takeover. This is leading to investment in a world of innovative authentication methods but that also means FIs find themselves...
During the past year alone, we've witnessed a number of devastating cyber attacks, from the massive Equifax breach to the seemingly never-ending Yahoo! breach.
The 2nd annual Inside the Mind of a Hacker report was created to shed light on the makeup of the bug hunting community and gain insight and understanding into...
Many enterprises use remote desktop protocol to remotely administer their PCs and mobile devices. But security experts warn that weak RDP credentials are in wide circulation on darknet marketplaces and increasingly used by ransomware attackers.
A Belgian security researcher has discovered a "serious weakness" in the WPA2 security protocols used to encrypt many WiFi communications. Attackers can exploit the flaws to eavesdrop as well as potentially inject code such as malware or ransomware into WiFi-connected systems. Prepare for patches.
This monthly Security Agenda will highlight some of the most recent additions to our course library. September's edition features Ed Amoroso on the evolution of the role of a CISO. Other influencers like Hearst CISO David Hahn, First U.S. CISO, Gen. Gregory Touhill, Retired and Jennings Aske, CISO of New...
Card issuers can view the merchants with whom a cardholder does business, the frequency of a cardholder's purchases, and the devices and IP addresses associated with that specific card. While this allows them to understand and assess certain patterns of behavior for individual cardholders, it restricts analysis to the...
When cardholder transaction and device data are disconnected, the potential for card issuers to more accurately detect and flag instances of fraud remains untapped. And as the connectivity of information in the real world continues to increase, so will related risks from fraudsters if issuers continue to rely solely...
Can your financial institution automatically detect and prevent phishing attacks? Swiftly identifying and taking down these websites is time-consuming - and unfortunately, most users submit their credentials in the first few hours of the attack. As a result, to guard against phishing you need the ability to protect...
Modern enterprises are in the midst of a digital revolution, adapting to the demands of Business 2.0. They are looking to embrace new business opportunities, expand into new markets, and propose new product offerings, as well as be more agile in responding to existing demands. This transformation relies on digital...
Today's FIs face a breadth of consumer demands, competitive threats and security and fraud risks. Acquiring and retaining consumers in a fiercely competitive marketplace flooded with waves of non-traditional players requires a consumer-centric digital strategy. The key enabler for an effective digital strategy is...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.