14 Keys to Protecting Against Ransomware

Submitted by gdsavvy@grantd… on Tue, 11/29/2016 - 17:26

Cyber crime has become a lucrative business and, unfortunately, ransomware has become an integral attack method that many organizations are fighting a losing battle against. While ransomware isn't going away any time soon (if ever), you can defend your organization - if you're properly prepared.

Winning the face-off against fraud

Submitted by gdsavvy@grantd… on Tue, 11/29/2016 - 17:22

How the most effective financial institutions are outthinking the bad guys

Financial crime control is a chief priority for most financial institutions around the world, as they continuously evaluate the best ways to safeguard their systems, their data and, ultimately, their clients. Indeed, fraud and cyber security are on the formal management committee agendas at least quarterly for 80 percent of institutions, according to our recent financial fraud survey.

Six Steps To A Better Security Strategy

Submitted by gdsavvy@grantd… on Tue, 11/29/2016 - 17:12

Creating and maintaining a security strategy is fundamental for CISO success. Unfortunately, many of today’s strategies fail to connect with the business or create a compelling case for action, which undermines the CISO’s support and credibility. In this report, we provide you with the six steps to create an effective security strategy linked with key business interests and success factors.

Using Threat Intelligence to Get the Upper Hand on Cybercriminals

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 20:17

Understanding your adversaries' tools, techniques, and processes (TTPs) that they're likely to weaponize is the best way to anticipate and combat threats. This whitepaper shares research on the latest attacker tools, provides architecture recommendations for organizations looking to strengthen security controls, and helps analysts use threat intelligence to more quickly and effectively identify threat trends.

Download this whitepaper now and learn how to:

The Route to Trusted IDs

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 20:03

When it comes to describing the top fraud threats to U.K. financial institutions, it's all about compromised identities and credentials, says John Marsden of Equifax. How can organizations prove their customers are who they say they are?

In an interview about fighting fraud by authenticating identities, Marsden discusses:

  • Why traditional anti-fraud tools are ineffective against today's top schemes;
  • How organizations can prove that customers are really who they say they are;
  • How to enhance security without hurting the customer experience.

Understanding Social Engineering

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 19:55

The title of the new book is Understanding Social Engineering Based Schemes. And its mission is three-fold, Jakobsson says. He wants to profile today's most common schemes, forecast some future trends, and help organizations build effective countermeasures.

In an interview about the contents of his new book, Jakobsson discusses:

  • The evolution of socially engineered schemes;
  • Why these scams are still so successful;
  • Technology solutions that can help detect and deter the scammers.

5 Blind Spots That Kill Cybersecurity

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 19:16

One of the most difficult and endemic problems facing cybersecurity departments today is security's 'you don't know what you don't know syndrome.' All too often, information security practitioners are tasked with responding to incidents on their network that they may not even know exist until they've already become full-fledged breaches.

Security pros face announcements of new zero-day discoveries without any reliable means to confirm whether those newly uncovered attacks have ever impacted the organization.

Rethinking Data Discovery and Data Classification

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 18:55

Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

In this whitepaper you will learn the key takeaways including:

  • Defining your data is the foundation for data security and control.
  • Data classification does not have to be complicated.
  • Dynamic data classification requires both tools and human intervention.

Proactive Malware Hunting

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 16:54

If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.

In an interview about proactive malware detection, Kleczynski discusses:

  • Why it's not enough to react to malware;
  • The evolution of endpoint malware detection;
  • Why risks of the Internet of Things are overhyped.