News
See the startling results of meticulous analysis of hundreds of real-life insider attacks and learn about new technologies that are able to detect the anomalous behavior patterns often before fraud ...
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site. OnDemand access to this ...
How to recognize examples of fraudulent activities in your environment; How to more quickly find anomalies of transactions or behaviors of accounts that are fraudulent, acting fraudulently or being ...
Nearly every organization is required to have a Business Continuity Plan. Yet, planners often overlook issues related to resource allocation -- the "people, places and things" necessary for business ...
A financially strapped cloud services vendor that experienced a 2020 ransomware attack affecting dozens of healthcare sector clients and hundreds of thousands of patients has agreed to a $1.9 million ...
Virtual desktop solutions (VDI) have long been the default for enabling remote access to company data. But as today’s workforce evolves - driven by the rise of contractors and remote employees using ...
The governor of Rhode Island slammed professional services firm Deloitte for failing to spot a months-long hack attack against the RIBridges health and human services data environment it manages, ...
Serviceaide, a provider of agentic AI-based IT management and workflow software, reported to regulators that an inadvertent exposure of data on the web has affected more than 483,000 patients of ...
Competing for customer loyalty in a digital world is hard. To add to this challenge, security teams must defend the business from motivated adversaries who have evolved their tactics to bypass ...
The best way to change user behaviour and create a culture of enhanced security awareness is through a comprehensive security program that leverages a wide variety of tools and techniques. During this ...
The 2020 presidential election was a major security challenge for the federal Cybersecurity and Infrastructure Security Agency. Yet, it was only a prelude to SolarWinds, Colonial Pipeline, Kaseya and ...
The British National Health Service is prodding suppliers to commit to voluntary cybersecurity measures in a bid to prevent disruptive hacks. See Also: Cloud Security in Healthcare: Shifting from ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results