The Future of Phishing: It’s all about your customers

SEGASEC

While current anti-phishing solutions usually cover basic entry-level phishing scams using reactive inside-the-firewall defenses, a billion of potential variations of sophisticated phishing scams are already being planned and executed everywhere on the internet, entirely undisturbed, evading most current detection tools. Todays phishing attacks are no longer performed by scruffy hoodie covered villains, but by sophisticated, risk-calculating, online marketing experts who take social engineering to new heights. By constantly using A/B testing to improve their technology with each attack, they know how to tell a convincing story that would trick even the savviest users, causing irreversible reputational and financial damages to brands worldwide.
Watch Now

Spotlight

Investments in edge security (end-point and network), continues to grow. Core security (identity management), grows more slowly, but is still a well-established, multibillion-dollar business. A third area of activity, namely data security, is by comparison relatively neglected. Read this white paper to learn why protecting the d

OTHER ON-DEMAND WEBINARS

THE CYBERSECURITY CHALLENGE IN CEE - KEY REPORT FINDINGS

CMS

We will be hosting a live webinar on Monday 10 December 2018 at 4pm CET to discuss some of the key findings in the report. Moderated by John Malpas, Publishing Director at Legal Week, the panel will be joined by Andrea Simandy, European Data Protection Attorney at Microsoft, Dora Petranyi, CEE Managing Director at CMS and Dominic Carman, Writer and Consultant, who worked with the Legal Week Intelligence team on the research and writing for the report.
Watch Now

No Host Found: Remote Connection Security in a Post-VPN World

Internet connectivity has become a must-have feature for digital business operations. Devices on the edge provide significant value, but the constant connectivity comes with a price in terms of security risk. Hackers may target industrial controls, healthcare devices, sensors, or vehicles through their open ports and global IP a
Watch Now

NIST Recommendations for ICS & IIoT Security

SANS

WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk of costly downtime, safety failures, environmental incidents, and theft of sensitive intellectual property. NIST and the NCCoE recently published a NIST Interagency Report (NISTIR) demonstrating how off-the-shelf, ICS-aware behavioral anomaly detection (BAD) effectively reduces cyber risk for manufacturing organizations, without impacting OT networks, as well as risk from equipment malfunctions.
Watch Now

Key Trends in Payments Intelligence - Machine Learning for Fraud Prevention

Bank information security

Banks can drive real value to their fraud prevention strategies with machine learning and analytics if they cut through the hype. Machine learning can be made intuitive and available directly to fraud experts. A multi-faceted strategy can turn fraud prevention expertise into a revenue generator for the business. Register for this webinar and join Marc Trepanier, Principal Fraud Consultant at ACI Worldwide, and leading industry analyst Julie Conroy of Aite Group as they discuss real-life use cases that demonstrate how banks can: Improve data management control costs while reducing the compliance and regulatory risks.
Watch Now

Spotlight

Investments in edge security (end-point and network), continues to grow. Core security (identity management), grows more slowly, but is still a well-established, multibillion-dollar business. A third area of activity, namely data security, is by comparison relatively neglected. Read this white paper to learn why protecting the d

resources