Distributed Denial of Service attacks - DDoS. They used to be nuisance crimes committed by gaming rivals and script kiddies. The stakes grew higher five years ago, with the rise of hacktivism and high-profile attacks on large U.S. banks. But even those attacks are minor when compared with today's huge, IoT...
What are the top forms of fraud you're defending against? And how are you ensuring that customers have both a secure and positive transaction experience?
Take the 2017 Faces of Fraud Survey to learn more about the fraud evolution and the renewed focus on customer experience.
In today's shape-shifting threat landscape, every organization needs the same thing: Real-time, actionable threat intelligence. And there is no shortage of intelligence feeds from reputable third-party sources. But are there too many intelligence feeds for systems and analysts to process? How effectively is actionable...
Ransomware dominated the headlines in 2016, as organizations of all sizes and sectors fell victim to malware that locked down, encrypted - and in some cases threatened to destroy - critical systems and data. But is ransomware truly as big a security challenge as it is a compelling story? And what lessons have...
They have become two of the more common cybersecurity questions in boardrooms worldwide: "Are we secure enough?" "Are we getting proper value from our cybersecurity investments?" Tough questions and even tougher to answer when security leaders don't have benchmarks and metrics in place to gauge their cybersecurity...
Ransomware has exploded to become the highest-profile cybercrime of 2016. Once aimed primarily at consumer PC users, ransomware now has become the bane of enterprises of all sizes and sectors. Criminals infect systems with polymorphous malware that either locks or encrypts critical data or devices until a ransom is...
From Anthem to OPM, the news continually alerts us to high-profile breaches that involve the compromise of critical data. And as breach incidents and costs mount, security leaders must ask: How secure are our data centers? How secure should they be?
The Healthcare Information Security Today survey is a comprehensive study that measures progress toward ensuring the privacy and security of healthcare information as more records are digitized and shared, and as new cyberthreats emerge and evolve.
Since 2013, global organizations of all sectors and sizes have grappled with a new wave of distributed denial of service attacks that at best have been a nuisance, at worst have served as distractions so cyber-criminals could commit fraud. DDoS defenses have improved, but the attacks continue to evolve in scale and...
What are the top forms of fraud afflicting UK banking institutions, and how are these entities fighting back? Take this special UK edition of the Faces of Fraud survey and help us benchmark how organizations affected by today's financial security risks will address fraud and cyber-threats in 2015.
In advance of the 2014 Toronto Fraud Summit, what are the top forms of fraud afflicting Canadian banking institutions, and how are these entities fighting back? Take this special Canadian edition of the Faces of Fraud survey and help us benchmark how organizations affected by today's financial security risks will...
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
In our increasingly mobile society, organizations, their employees, partners and customers are at greater than ever risk of identity theft and fraud. How prepared are organizations to mitigate these risks? This survey helps establish the new benchmark.
The survey has closed. Today's sophisticated attackers use ever-stealthier malware and zero-day exploits to evade traditional security defenses, making organizations increasingly vulnerable to advanced persistent threats. This survey helps determine the current APT landscape, and where traditional security solutions...
What are today's most predominant and damaging fraud incidents impacting banking institutions and their customers? And what anti-fraud investments are institutions making to thwart the fraudsters? Take the 2013 Faces of Fraud: The Threat Evolution survey and help us answer these questions.