How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career

Shaked Vax dismantles bombs and created light shows for rock stars before starting his cybersecurity career. Now he’s leading IBM Trusteer’s move into frictionless identity management.

The post How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career appeared first on Security Intelligence.

Continue reading How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career

Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand

When framed as an innovative, even “cool” feature, multifactor authentication can deliver the security online retail customers demand without diminishing the user experience.

The post Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand appeared first on Security Intelligence.

Continue reading Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand

Board Directors Can’t Afford to Ignore Cybersecurity Risk

As businesses rush to adopt emerging technologies such as AI, blockchain and big data, board directors must increase their engagement around cybersecurity risk.

The post Board Directors Can’t Afford to Ignore Cybersecurity Risk appeared first on Security Intelligence.

Continue reading Board Directors Can’t Afford to Ignore Cybersecurity Risk

The Success of Your Business Depends on Digital Trust. Here Is How to Measure It

As consumers become more aware of their data privacy, organizations across sectors are under increasing pressure to deliver frinctionless digital trust.

The post The Success of Your Business Depends on Digital Trust. Here Is How to Measure It appeared first on Security Intelligence.

Continue reading The Success of Your Business Depends on Digital Trust. Here Is How to Measure It

How Alex Rombak Uses His Hospitality Background to Provide Top Tier Technical Support

Alex Rombak has heard your jokes about tech support, and he doesn’t mind. He knows the important role he plays in supply chain security, supporting financial institutions when things go wrong.

The post How Alex Rombak Uses His Hospitality Background to Provide Top Tier Technical Support appeared first on Security Intelligence.

Continue reading How Alex Rombak Uses His Hospitality Background to Provide Top Tier Technical Support

The Simpler the Better? Looking Deeper Into the Malware Used in Brazilian Financial Cybercrime

The majority of financial cybercrime risks can be mitigated with continued user education and by placing the right controls on user devices to help protect against malware.

The post The Simpler the Better? Looking Deeper Into the Malware Used in Brazilian Financial Cybercrime appeared first on Security Intelligence.

Continue reading The Simpler the Better? Looking Deeper Into the Malware Used in Brazilian Financial Cybercrime

How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education

As threat research team lead at Trusteer, Tomer guards the gateway to both known and unknown threats and passes along his insights to help banking customers protect themselves from social engineering.

The post How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education appeared first on Security Intelligence.

Continue reading How Tomer Agayev Fights Financial Fraud Through Curiosity, Suspicion and Education

How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud

If you’ve ever gotten a financial fraud alert from your bank, you can thank Daniel Gor for developing the automated processes by which fraud analysts monitor customers’ behavioral patterns.

The post How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud appeared first on Security Intelligence.

Continue reading How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud

Cyber Monday 2018: 5 Best Practices to Protect Consumer Data

Cyber Monday 2018 is just around the corner, and customers and malicious actors alike are gearing up. Is your retail security ready to tackle e-commerce fraud and improve consumer data protection?

The post Cyber Monday 2018: 5 Best Practices to Protect Consumer Data appeared first on Security Intelligence.

Continue reading Cyber Monday 2018: 5 Best Practices to Protect Consumer Data

Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape

In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime.

The post Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape appeared first on Security Intelligence.

Continue reading Easy Does It! A Timely Look Into Fraud TTPs in the Brazilian Financial Cybercrime Landscape