CyberSecurity

The Route to Trusted IDs

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 20:03

When it comes to describing the top fraud threats to U.K. financial institutions, it's all about compromised identities and credentials, says John Marsden of Equifax. How can organizations prove their customers are who they say they are?

In an interview about fighting fraud by authenticating identities, Marsden discusses:

  • Why traditional anti-fraud tools are ineffective against today's top schemes;
  • How organizations can prove that customers are really who they say they are;
  • How to enhance security without hurting the customer experience.

5 Blind Spots That Kill Cybersecurity

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 19:16

One of the most difficult and endemic problems facing cybersecurity departments today is security's 'you don't know what you don't know syndrome.' All too often, information security practitioners are tasked with responding to incidents on their network that they may not even know exist until they've already become full-fledged breaches.

Security pros face announcements of new zero-day discoveries without any reliable means to confirm whether those newly uncovered attacks have ever impacted the organization.

Proactive Malware Hunting

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 16:54

If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.

In an interview about proactive malware detection, Kleczynski discusses:

  • Why it's not enough to react to malware;
  • The evolution of endpoint malware detection;
  • Why risks of the Internet of Things are overhyped.