Trust in Cyberspace

As we expand on the train of thought from (ISC)2®’s whitepaper Code (In)Security, which closed with the admonition that “insecure code means checkmate,” we must realize that the state of affairs when it comes to software security is even more than a chess game; it’s nothing less than a battle – a battle between the attackers and the defenders; between those who are trying to break your software and those who are trying to defend it at all costs; between the black hats and the white hats. We are at war, and a war in which the enemy is not only merely subtle, but in most cases invisible. The theme for the Randolph Air Force base conference, “Cyber Security, the Invisible Man”a only accentuates this point

Spotlight

ThreatMark

ThreatMark offers fraud-prevention as a service for web and mobile applications. Their Cognitive Fraud-prevention Solution combines expert knowledge, hacker know how and machine learning to protect against phishing and malware, and to secures millions of users against account takeovers and payment fraud. Instead of identifying patterns in past attacks, ThreatMark focuses on authenticating genuine users in sensitive online environments, such e-commerce sites or online banking applications.

OTHER WHITEPAPERS
news image

Revolutionizing cybersecurity

whitePaper | October 31, 2021

FINX, a platform established since 2018 that is enabled by blockchain technology to create the world’s 1st comprehensive decentralized banking platform. FINX aspires to resolve the problem of high banking costs imposed by conventional banks and serve the unbanked market in Southeast Asia.

Read More
news image

Best Practices for Common Cybersecurity Threats

whitePaper | November 28, 2022

The threat of Criminal cyber activity continues to grow for organizations around the world, targeting everyone from select individuals to leading corporations and federal governments.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

Navigating the Changing Cyber Landscape in Australia

whitePaper | April 13, 2023

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

Read More

Spotlight

ThreatMark

ThreatMark offers fraud-prevention as a service for web and mobile applications. Their Cognitive Fraud-prevention Solution combines expert knowledge, hacker know how and machine learning to protect against phishing and malware, and to secures millions of users against account takeovers and payment fraud. Instead of identifying patterns in past attacks, ThreatMark focuses on authenticating genuine users in sensitive online environments, such e-commerce sites or online banking applications.

Events