Defending a Decade of Phishing and Cybercrime

With holiday shopping season in full swing, many of us are feeling just like the guy in the song, “The 12 Pains of Christmas.”  I have my own two personal pains with the holidays, and I am still deciding which one is more annoying: Elf on the Shelf, or, the mountain of phishing emails I have…

Threat Detection: What Goes Into a Successful Strategy?

The cat’s officially out of the bag when it comes to threat detection: The majority of the industry simply isn’t satisfied with its current solutions. In fact, 76% of respondents in a recent RSA survey indicated that they were not confident in their ability to detect and investigate threats to their environment. Where did matters…

Forensics Meets Continuous Security Monitoring to Achieve Optimal Visibility

Digital forensics is estimated to be a $3.2 billion industry by 2020, according to research from RnR Market Research summarized by WhaTech. The industry has grown due to the virtually ubiquitous use of IT systems in personal, corporate, and governmental settings. The need for the IT department to “see” from the network command center out…

Living With The Hacker-Industrial Complex

At one of my previous cybersecurity jobs, I received a frantic call from a man whose production company had just been hit with a massive breach. The company’s main summer release was in final post-production when it was hacked, and within a day had over 100,000 downloads. It hadn’t crossed anyone’s mind that the company’s…

Cybercrime in Social Media Grows 70% in Six Months

These days, all you need to do is type “botnet,” “hacking,” “DDoS,” “CVV2,” or any other cybercrime-related term into the search bar on most social media platforms, and you will find a plethora of fraud activity occurring in plain sight.  As reported earlier this year by RSA, social media has become a breeding ground for cybercrime-related…

2017 Global Fraud and Cybercrime Forecast

From mobile threats and malware, to the organizations on the target lists of e-commerce fraud – a myriad of threats exist across the cyber landscape and the commoditization of cybercrime is making it easier and cheaper to launch attacks on a global scale.  If you are a believer that the best predictor of future events…

Proximity-Based Identity Assurance: Balancing Act Between Security & Convenience

For years, finding the right balance between security and usability has been one of the biggest challenges for identity and access management (IAM) solution architects and designers. There are ongoing efforts in the industry to replace password-based authentication with something more secure, more convenient, and with minimum investment; such proposed methods seem to fall into…

Four Characteristics of Top-Notch Threat Intelligence

Threat intelligence is a hot topic these days and was arguably one of the top themes of RSA Conference 2016. However, organizations need to realize that simply having more data about the latest threats, vulnerabilities, and exploits is not the answer to all their cybersecurity problems. On the contrary, threat intelligence is only helpful if…