Does the West want to have its digital existence defined by adversaries, or is it ready to devote the time, resources, expertise and planning required to more fully take control of its evolving destiny? That's the techno-Darwinian call to arms issued by Jeremy Fleming, the director of Britain's GCHQ intelligence...
To help mitigate the risks of state-sponsored cyberattacks against India's critical infrastructure - and improve detection and response - requires industry collaboration and information sharing, root cause analysis with specialized forensics, and better testing of code, a panel of experts says.
Microsoft Corp. on Monday announced it will acquire cloud-based speech technology and artificial intelligence vendor Nuance Communications in an all-cash transaction valued at $19.7 billion. The deal is expected to close by the end of this year.
Economic turmoil, triggered by the global spread of COVID-19, is increasing and accelerating opportunistic, premeditated and organized insurance fraud. Criminals who invent claims will spend time to discern how to best exploit the weaknesses of an insurer’s fraud defenses. Customers and agents are learning how to...
Pharmaceutical companies can leverage data analytics, predictive analytics and artificial intelligence to fight drug diversion fraud, says Charles Washington, senior director, global fraud and asset protection, at Pfizer.
IBM Security™ QRadar® was again named a Leader in the Forrester Wave for Security Analytics (SA), with the highest-rated security analytics offering of the 11 vendors evaluated. We believe our continued leadership in the report is reinforced by our continued innovation in key areas, such as AI, threat intelligence,...
He started his cybersecurity career as a pen tester. As a result, Gong CISO Jack Leidecker retains an affinity for the tech community and emerging tools. He shares insight on this passion and his drive to ensure security’s role in business enablement.
At the heart of every cyberattack is an element of social engineering. From more common attacks, such as phishing, to more sophisticated attacks, such as authorized push payments and voice scams, cybercriminals have impersonation of our most-trusted institutions down to a science. This e-book explores how behavioral...
More fraudsters are using artificial intelligence to generate “Frankenstein faces” for use in synthetic identity fraud. Kathleen Peters of Experian outlines this disturbing development in fraudster behavior, as outlined in a new report.
Organizations in the APAC region are not immune to the impact of the SolarWinds supply chain hack, so it's essential that they reassess their risk management practices and audit their suppliers, two security experts stress.
Digital wallets, super apps and digital IDs all have substantial roles in the new consumer landscape. And identity proofing is critical for the fraud-prevention success of each of these emerging technologies, says Shai Cohen of TransUnion.
The new year has kicked off with a flurry of data security company acquisition activity; five deals have already been announced. Companies making acquisitions are striving to improve their secure access service edge - or SASE - posture, enter new markets or bolster their technology portfolios.
Many companies claim to be successfully using artificial intelligence for security, but the use cases are still not convincing because the technology is incapable of detecting unknown malware, says Guy Sheppard of SWIFT.
Global messaging app WhatsApp's instant payment service went live in India on Dec.16. But despite its two-factor authentication being accepted by leading banks, there are concerns about potential security issues.
Enterprises should have an incident response plan with a continuous monitoring threat intelligence sharing mechanism to help protect critical infrastructure from nation-state attacks, says Jayesh Ranjan, principal secretary-IT, government of Telangana