Where Do We Stand With Digital Identity Trust? Top 5 Findings From the ISMG Survey

When it comes to digital identity trust, many organizations still struggle to strike the right balance between security and the customer experience.

The post Where Do We Stand With Digital Identity Trust? Top 5 Findings From the ISMG Survey appeared first on Security Intelligence.

Continue reading Where Do We Stand With Digital Identity Trust? Top 5 Findings From the ISMG Survey

Here’s Why Business Email Compromise Is Still Driving Executive Identity Theft

Business email compromise scams are still surprisingly lucrative. In fact, the volume and frequency of BEC attacks have skyrocketed in recent years, according to FBI data.

The post Here’s Why Business Email Compromise Is Still Driving Executive Identity Theft appeared first on Security Intelligence.

Continue reading Here’s Why Business Email Compromise Is Still Driving Executive Identity Theft

Checkmate: How to Win the Cybersecurity Game

Some refer to information security as a war, but it’s better to think of it as a game. To win the cybersecurity game, you need to immerse yourself, practice and retrain regularly.

The post Checkmate: How to Win the Cybersecurity Game appeared first on Security Intelligence.

Continue reading Checkmate: How to Win the Cybersecurity Game

CamuBot: New Financial Malware Targets Brazilian Banking Customers

IBM X-Force researchers identified new financial malware, dubbed CamuBot, that attempts to camouflage itself as a security module required by the Brazilian banks it targets.

The post CamuBot: New Financial Malware Targets Brazilian Banking Customers appeared first on Security Intelligence.

Continue reading CamuBot: New Financial Malware Targets Brazilian Banking Customers

‘All the Queen’s Horses’: A Real-World Use Case for Managing Insider Threats

On Sept. 6, director Kelly Richmond Pope will discuss a case in which a small town official stole $53 million in public funds over two decades to illustrate the importance of managing insider threats.

The post ‘All the Queen’s Horses’: A Real-World Use Case for Managing Insider Threats appeared first on Security Intelligence.

Continue reading ‘All the Queen’s Horses’: A Real-World Use Case for Managing Insider Threats

It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion

Regulators and digital coin exchanges should build robust cryptocurrency security into their systems to protect themselves and individual investors from theft and fraud.

The post It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion appeared first on Security Intelligence.

Continue reading It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion

Getting Your Organization Up to Speed With SAP GRC

There’s a gowing disparity between IT professionals and the C-suite regarding SAP GRC concerns. Bridging this gap of understanding is the first step toward an effective compliance strategy.

The post Getting Your Organization Up to Speed With SAP GRC appeared first on Security Intelligence.

Continue reading Getting Your Organization Up to Speed With SAP GRC

Password Management Remains an Issue — What’s Next?

Common password management habits have been insecure and out-of-date for a while. But despite knowledge of the risks around recycled credentials and other gaps, users have been slow to change tack.

The post Password Management Remains an Issue — What’s Next? appeared first on Security Intelligence.

Continue reading Password Management Remains an Issue — What’s Next?

BackSwap Malware Now Targets Six Banks in Spain

IBM X-Force researchers discovered that BackSwap, a banking Trojan that had previously only targeted Polish banks, now has its sights set on six banks in Spain.

The post BackSwap Malware Now Targets Six Banks in Spain appeared first on Security Intelligence.

Continue reading BackSwap Malware Now Targets Six Banks in Spain