Abnormal Security is out with new financial crimes research, and it
shows that traditional business email compromise is evolving into
new forms of financial supply chain compromise. Crane Hassold
shares insights on the crimes and how best to detect, deter and
respond to them.
In a video interview with Information...
This annual survey seeks to evaluate the current and projected impact of fraud on the finance and treasury environment. Practitioners from all industries are polled on their experiences with fraud and on the range of controls, safeguards and security practices employed to protect their financial assets and...
Though less eventful than its predecessor, 2021 was another blockbuster year for cybersecurity. With 2020’s scramble to enable remote working fading from memory, securing hybrid setups in the long term presented a new and complex challenge.
At the same time, cybercrime went prime time. High-profile cyber-attacks...
At the start of 2021, vaccine rollout let people imagine an end to pandemic disruption. But some of the world’s smartest cyber criminals weren’t interested in returning to business as normal. Over the first half of the year, a series of ransomware attacks on global infrastructure pushed cybersecurity to the top of...
If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
Let’s face it: phishing threats are getting into your end users’ inbox.
Over 50% of phishing emails are bypassing existing email security EVERY month delivering phishing threats to tempt users to click and give up network or personal credentials, activate malware, or scams like business email compromise...
Financial services firms lose an average of $18.5 million per year through malicious activity like leaked credentials, payment fraud, money laundering, fake account registration, loyalty abuse, and more. Fraud prevention depends on effective intelligence gathering, and few firms have the tools or personnel to...
The new Expel Quarterly Threat Report provides data on what we’re seeing,
detection opportunities, and resilience recs to help protect your organization.
We’ll dive into the trends in this report, based on incidents the Expel security
operations center (SOC) team identified through investigations into...
Material Security has closed a $100 million funding round on a $1.1 billion valuation to extend its protection of sensitive content at rest beyond email. The startup will take patents for defending content in old emails and apply them to SaaS applications such as Dropbox, Google Drive and Slack.
Abnormal Security has closed a $210 million funding round on a $4 billion valuation to apply its account takeover prevention technology to areas other than email. The company wants to use its AI to protect accounts across systems and SaaS platforms and in environments such as Workday and Salesforce.
Transform attackers' favorite targets into your best defense
More than ever, attacks seek to exploit human vulnerabilities, not just technical flaws. In most cases, they do it through email. But you can transform every potential victim into a defensive choke point by making email reporting and remediation key parts...
Email is your most essential business tool—and today’s top malware delivery vector. This vital communications channel has become fertile ground for today's most damaging cyber threats and all kinds of fraud. Because email threats inherently target people, an effective cybersecurity program focuses on people first....
Today’s sophisticated cyberattacks combine multiple tactics that include social engineering, zero-day malware and 3rd party OAuth app abuse. Threat actors employ tactics across email, cloud and web that target specific people in your organization to breach your environment and access sensitive data. Hybrid work...
Today’s sophisticated cyberattacks combine multiple tactics that include social engineering, zero-day malware and 3rd party OAuth app abuse. Threat actors employ tactics across email, cloud and web that target specific people in your organization to breach your environment and access sensitive data. Hybrid work...
The recent drop in stock prices has presented private equity firms with a golden opportunity to acquire fast-growing public cybersecurity companies without breaking the bank. Financial buyers have taken advantage, scooping up five of the less than 30 public pure-play cybersecurity vendors.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.