The global insurance company, AXA, will no longer write policies in France that reimburse customers for extortion payments made to ransomware criminals. How much longer before the same applies in the U.S.?
Recently, the Board of Governors of the Federal Reserve System, CFPB, FDIC, NCUA and OCC released a request for information and comment on financial institutions’ use of artificial intelligence and machine learning.
I’m writing this column just days after the Microsoft Exchange vulnerability release, and I’m sure that by the time this is published, it will be much, much worse.
As cyber threats have increased, more organizations need access to the latest threat intelligence.
Cyber threats are daunting. Not only are they complex and constantly evolving, but they also have the potential to impart significant financial and reputational damage to our financial institutions.
Changes in technology have been revolutionizing business for a long time but recently this trend has been expedited due to the rapid increase in work-from-home as well as the adoption of technologies such as the cloud.
Social media has changed the ways we live our lives — from the way we get our news to the way we interact with our family, friends and peers. It’s everywhere, it’s unavoidable, it’s powerful and it’s here to stay.
Here we are almost to 2021. Do you feel any more cybersecure? Just this year, we’ve seen a 20% increase in cyber fraud and abuse and a startling 200% increase in business email compromises.
For the 17th year in a row, the National Cyber Security Alliance and CISA have announced October as Cybersecurity Awareness Month. This year’s theme is “Do Your Part. #BeCyberSmart.”
Most organizations struggle with just being secure and functional, but the financial services industry has the bonus plan by including compliance.
What have we achieved with our investment, are we any more secure than we were, how much more are we going to spend?
When the mandate came down to get employees up and running first and foremost in order to service the customers, there wasn’t enough time to properly address each security risk.
I think we’ve learned that we can secure our remote workforces and, at the same time, they can continue to be productive. As for myself, I now have a much clearer picture of where my organization’s cyber weaknesses are.
Business email compromise is a sophisticated scam that targets both businesses and individuals that transact legitimate transfer of funds requests.
As companies get better at detecting cyber events and data breaches, most continue to struggle with the proper handling of these incidents.
“The main thing is to keep the main thing the main thing,” written by famous business author, Stephen Covey, should especially ring true as we’ve entered into a new decade.
A survey conducted by The Harris Poll found that an overwhelming majority of consumers (92%) have concerns about the security of their personal, confidential online data.
Vendor risk management has become a crucial area of cybersecurity as banks move operations to the cloud and asset managers hire third parties to manage their technology.
The theft of ATMs is yet another crime that continues to plague our industry. This includes the rise of cyber threats to ATMs, such as skimming, shimming, cash-out and jackpotting, as well as the age-old technique of crash and grab the whole ATM.
According to the NCSA, ???The line between our online and offline lives is indistinguishable. In these tech-fueled times, our homes, societal well-being, economic prosperity and nation???s security are impacted by the internet.???
Like the thousands of data breaches before, security leaders will be answering the same question from their executive teams, ???Can this happen to us???? And I???m sure most of the responses will be, ???It???s not a matter of if, but when we get hack
The phone call has mostly been replaced with the targeted email since that is how we mainly communicate, but I???ve certainly seen an uptick in the SMS/text messaging attacks.
Over the years, I???ve watched the sophistication, impact and scale of cyber-attacks grow exponentially, from the nuisance attacks with computer worms and viruses in the early 90s to the large-scale data breaches that we almost daily.