Solving the Puzzle of Global Identity Verification

With customer bases that span the globe and the growing prevalence of online fraud, financial service providers know that effective identity verification (IDV) is imperative. But meeting anti-money laundering (AML) and know your customer (KYC) complia… Continue reading Solving the Puzzle of Global Identity Verification

Health Care Security Must Mature With 5G

It’s clear that 5G technology is rapidly coming of age, and is enjoying wide adoption across every industry. According to Gartner, the market for 5G infrastructure was predicted to hit $4.2 billion over the past year, with two-thirds of companies depl… Continue reading Health Care Security Must Mature With 5G

Cyberresilience: Your Data Insurance Policy

In the wake of the Colonial Pipeline hack, businesses all over the world are getting a very loud reminder that they could be next to be compromised by a ransomware intrusion. For many, it’s not an ‘if,’ but a case of how and when. Even mul… Continue reading Cyberresilience: Your Data Insurance Policy

Elevating Web App Security to a National Priority

It’s been an eventful few months in terms of sizable cyberattacks. First, we had the SolarWinds hack, then the Colonial Pipeline ransomware attack made cybersecurity acutely real for millions of people in the U.S. Most recently, the Kaseya ransomware … Continue reading Elevating Web App Security to a National Priority

Colonial Pipeline Hinted at Critical Infrastructure Threat

The long gas lines, panic buying and price spikes are fading into memory. But the ransomware attack in early May 2021 on the largest fuel pipeline in the U.S. must continue to drive urgent action by the industry and policymakers to protect the nation’… Continue reading Colonial Pipeline Hinted at Critical Infrastructure Threat

Securing UX in Open Banking Apps

Historically, only large, well-established banks had control over the majority of consumer and corporate finances, making it highly challenging for smaller financial services providers to break into the market. Open banking has transformed the way org… Continue reading Securing UX in Open Banking Apps

Zero-Trust for the Post-Pandemic World

More than a year after the start of the COVID-19 pandemic, we’re seeing most companies either maintaining their remote work policies or slowly moving to a hybrid work model. In fact, an estimated 36.2 million Americans will be working remotely by 2025… Continue reading Zero-Trust for the Post-Pandemic World

Top 5 Physical Security Considerations

With the rise of IoT technology across every aspect of business, security convergence is quickly becoming the new norm. In a world where just about everything is connected to the internet and to other devices, old strategies are becoming obsolete. Tre… Continue reading Top 5 Physical Security Considerations

Real-Time Threat Assessment With In-Memory Computing

Today’s security information and event management (SIEM) solutions are inundated with incoming events and tracking potential threats to network infrastructure. Significant events must be identified and correlated to detect lateral movement and kill ch… Continue reading Real-Time Threat Assessment With In-Memory Computing

How to Protect Medical Devices from Ransomware

Cyberattacks on hospitals are rising, and patients are worried. Is my personal data at risk? Could ransomware or hackers effectively shut down the ER near me?  Consider these findings from a March 2021 report by cybersecurity provider Morphisec:   Abo… Continue reading How to Protect Medical Devices from Ransomware