Your Step-Up Authentication Compass… NIST & SMS – Finding North

An estuary is the area where a river meets the sea (or ocean), where fresh water from the river meets salt water from the sea. The fresh draft of the NIST Digital Authentication Guidance (NIST SP800-63B) has been let loose into the salt waters of the public and certainly provoked some conversation of late around…

The post Your Step-Up Authentication Compass… NIST & SMS – Finding North appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Your Step-Up Authentication Compass… NIST & SMS – Finding North

A New Generation of Hackers Target the Gaming Industry

Hackers love a crowd. That’s true when it comes to social media networks, government system websites, financial institutions, retailers, and, based on recent headlines, gaming sites.  For an industry projected to be worth nearly $100 billion in 2016, gaming offers a lucrative industry for cybercriminals.  Last year, gaming accounted for 1 in every 50 e-commerce fraud transactions,…

The post A New Generation of Hackers Target the Gaming Industry appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading A New Generation of Hackers Target the Gaming Industry

Account Takeover Gains Full Visibility with Web Behavior Analytics

Interest in and adoption of web behavior analytics is surging because of its ability to interpret the navigation and intent of each visitor to the website and as one of the best ways to protect the business against the skyrocketing rates of website fraud.  Account takeover is one of the predominant threats plaguing organizations with…

The post Account Takeover Gains Full Visibility with Web Behavior Analytics appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Account Takeover Gains Full Visibility with Web Behavior Analytics

Web Threat Detection Services Deliver SWIFT Remediation

With the dust settling on a series of high profile cyber heists against international banks SWIFT’s network used to facilitate international payments between banks, the service provider is weighing changes that would effectively exclude from its network banks that have, according to reports, “demonstrated weak information security.” The Brussels-based SWIFT (Society for the Worldwide Interbank…

The post Web Threat Detection Services Deliver SWIFT Remediation appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Web Threat Detection Services Deliver SWIFT Remediation

Play Pokemon Go? Know the Risks and How to Mitigate Them

Unless your home as been inside of a cave for the past week, you’ve certainly heard of Pokemon Go. Scratch that. Even if you have been living inside of a cave, chances are that someone inadvertently walked entered in hopes of locating Pikachu. While the game has become seemingly ubiquitous, you should be cognizant of…

The post Play Pokemon Go? Know the Risks and How to Mitigate Them appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Play Pokemon Go? Know the Risks and How to Mitigate Them

Hackers Hunt for Healthcare Records

What’s the difference between data theft from a bank account versus a healthcare record? For starters, think of theft from a bank account as the equivalent of a single withdrawal; one and done. Sooner than later it’s discovered, a new account number is issued and, as a hacker, you’re effectively cut off. When it comes…

The post Hackers Hunt for Healthcare Records appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Hackers Hunt for Healthcare Records

Cyber Scams to Beware of at the 2016 Summer Olympics

Are you planning to cheer on your country’s athletes in-person at the Summer Olympics in Rio and need some discounted tickets? Or maybe you can’t afford to actually travel there, but would love to win a ticket lottery that would increase your chances of doing so? Or maybe you’re not planning to attend at all…

The post Cyber Scams to Beware of at the 2016 Summer Olympics appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Cyber Scams to Beware of at the 2016 Summer Olympics

Enter at Your Own Risk: The Perils of Livestreaming Content

There’s no such thing as a free lunch, not even on the Internet. But if you do decide to splurge, new research finds your lack of willpower may come with a side order of malware. In this case, that free lunch actually refers to websites that offer free livestreaming of things like sporting events, concerts, and so on. Turns…

The post Enter at Your Own Risk: The Perils of Livestreaming Content appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Enter at Your Own Risk: The Perils of Livestreaming Content

Identifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6

Online fraud remains as much a part of digital life as URLs. Fraudsters are constantly devising new ways to separate consumers from their money, login credentials, Personally Identifiable Information (PII), healthcare data and anything else that can be monetized. Even more, they are doing it with speed and sophistication, but most damaging, they do it…

The post Identifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6 appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Identifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6

Consumer Security vs. User Experience in a Mobile World

Most people have had to go through the slow, and sometimes frustrating, process of standing in an airport security line at least once in their life. While not convenient for frequent flyers, we understand that although it is time consuming, it is vital to ensure security for people’s lives. However, this is not how customers…

The post Consumer Security vs. User Experience in a Mobile World appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Consumer Security vs. User Experience in a Mobile World