Financial institutions seeking a piece of the hot P2P payments market must act to prevent network fraud with a multilayered prevention approach that includes a robust fraud detection engine.
EU companies are far ahead of their U.S. counterparts in terms of adopting IT and security trends, according to recent research.
As you consider the various IT security events happening next year, here are five key reasons why you should attend some of the compelling IBM Security sessions planned at Think 2019.
A security escape room can be a fun and interactive way to train employees on various security concepts they might otherwise ignore.
With constantly evolving threats and a growing skills gap, the cybersecurity industry should consider alternative intelligence to enable the full digital transformation of our organizations.
A PowerShell malware downloader known as sLoad uses geofencing, customized emails and device reconnaissance to identify high-value Trojan targets.
Researchers reported that threat actors are using web services such as Google Drive, SharePoint and Dropbox to host files containing malicious links as part of phishing campaigns.
Security researchers discovered a recent phishing scheme that took advantage of Hurricane Michael's impact to steal victims' email credentials across multiple services.
While the CISO's role is more important than ever, recent studies have revealed a disconnect between CISOs and business executives and difficulities communicating security risks in business terms.
Under the Charter of Trust, limiting the impact of digital transformation and cybersecurity and building trust for users has to be the result of close collaboration at all levels.