The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor

Digital trust expert Rob Rendell explains what components are important for a smooth kickoff and how to prepare both your team and your new fraud protection vendor’s team.

The post The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor appeared first on Security Intelligence.

Continue reading The Digital Identity Trust Life Cycle: Onboarding and Deploying a Fraud Protection Vendor

Why Cybercriminals Are Targeting Travel and Transportation

Why are travel companies increasingly targeted in cyberattacks? Valuable data and customer hospitality demands make the travel and transportation industry especially tempting to cybercriminals.

The post Why Cybercriminals Are Targeting Travel and Transportation appeared first on Security Intelligence.

Continue reading Why Cybercriminals Are Targeting Travel and Transportation

How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering

Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?

The post How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering appeared first on Security Intelligence.

Continue reading How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering

How a Quirky Gmail Feature Led to a Phishing Scare and a Valuable Lesson in Email Security

What began as a moment of panic in the wake of what I thought was a phishing attempt ended up being a valuable lesson about a quirky Gmail feature and how it impacts the email security landscape.

The post How a Quirky Gmail Feature Led to a Phishing Scare and a Valuable Lesson in Email Security appeared first on Security Intelligence.

Continue reading How a Quirky Gmail Feature Led to a Phishing Scare and a Valuable Lesson in Email Security

Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns

IBM X-Force researchers observed cybercriminals engaging in three tax-themed malware campaigns likely aimed at businesses but with the potential to spread to consumers as well.

The post Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns appeared first on Security Intelligence.

Continue reading Cybercriminals Spoof Major Accounting and Payroll Firms in Tax Season Malware Campaigns

How a Cunning Remote Overlay Malware Met Its Match

A remote overlay malware that is attacking Latin American banks met its match in a solution built from behavioral biometrics, deep research, reverse engineering and finely tuned threat modeling.

The post How a Cunning Remote Overlay Malware Met Its Match appeared first on Security Intelligence.

Continue reading How a Cunning Remote Overlay Malware Met Its Match

Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security

Limor Kessem studied microbiology in school and planned to open a naturopathy clinic. She’s now one of IBM Security’s top cyber intelligence experts and a dedicated role model for women in security.

The post Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security appeared first on Security Intelligence.

Continue reading Global Cyber Intelligence Maven Limor Kessem Is a Guiding Light for Women in Security

Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand.

The post Are Passwords Killing Your Customer Experience? Try Passwordless Authentication appeared first on Security Intelligence.

Continue reading Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

Social Engineering Training: Why Getting Hacked Is a Security Advantage

Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees.

The post Social Engineering Training: Why Getting Hacked Is a Security Advantage appeared first on Security Intelligence.

Continue reading Social Engineering Training: Why Getting Hacked Is a Security Advantage