In the latest weekly update, the former federal CISO, Grant Schneider, joins three editors at ISMG to discuss important cybersecurity issues, including advice for the next White House cyber director and liability concerns facing CISOs following SolarWinds and its CISO being accused of fraud.
Financial institutions (FIs) are grappling with sophisticated authorized and unauthorized scams that are fueled by payments innovation and higher transaction volumes. With instant payments gaining worldwide adoption, real-time monitoring is the key to stopping trending scams—but that’s not the only trend to plan...
PSR shift in liability adds another dimension of complexity for financial institutions (FIs) combatting sophisticated APP fraud scams and new account fraud. Not only is it more challenging for FIs to protect themselves and customers, that liability shift could have deep revenue impact.
Financial institutions (FIs) are increasing their efforts to combat the alarming rise in fraud cases. A prominent example is the U.K. PSR’s upcoming shift in liability to FIs, especially relating to Authorized Push Payment fraud. With the PSR’s new policy, both the sending and receiving FIs will be responsible for...
Until now there has been an ongoing struggle regarding who owns the money mules and scams problem – Credit Risk, AML (KYC), or Fraud Management? With liabilities shifting, ownership is clearly landing on the shoulders of Fraud Management teams. Fraud leaders must act quickly or risk losing revenue, their reputation,...
Banking institutions have more data and analytics than ever before. But how are they using them to drive better risk and fraud decisions? Diana Rothfuss and Terisa Roberts of SAS open up on enterprise decisioning - linking people, data and processes faster and more efficiently.
In recent years, the adoption of public cloud infrastructures has surged, providing organizations with unparalleled flexibility and scalability. But this shift has also introduced a new set of challenges when it comes to protecting web applications and APIs that are hosted on these platforms.
Email is a major entry point for threat actors, who have evolved their tactics to bypass traditional security solutions and now leverage AI to make attacks more scalable and harder to detect. In response, organizations are buying AI-enabled solutions to bolster their security posture. This survey shows...
The advent of generative AI has transformed the way modern organizations operate. While many business users are adopting tools like ChatGPT and Google Bard to enhance productivity, cybercriminals are also capitalizing on this technology—resulting in more attacks with increased sophistication.
To understand how...
In the aftermath of the pandemic and global political unrest, the risks
of identity and credential theft have surged, and a deluge of scams are
exploiting the crisis. Consumers facing disrupted incomes seek credit
solutions, and fraudsters seek to exploit them by using application
fraud tactics.
In this eBook,...
Vice President at Appgate, Mike Lopez, offers his expert analysis on the survey findings and how this year's results were unique to the most current cyber threats.
Welcome to our report summarizing the 2023 Faces of Fraud survey. We are most grateful to our 150+ industry contributors who answered our questions frankly to enable us to provide a snapshot of the frauds causing most concern for financial services in 2023.
The data shared in this report, as well as expert...
Applications are, without a doubt, at the heart of all business activities. Secure and highly available applications power your business and the world.
But keeping them secure and building and deploying them in the cloud at low cost has never been more challenging.
Join us at the Akamai World Tour in Tokyo to...
An evolution in transaction monitoring is required to accurately detect suspicious activity and truly reduce false positives.
This comprehensive guide helps you quickly assess your program’s current state and identify opportunities for improvement. By updating processes, implementing the right tech, and closing...
Application journeys are fluid in practice because applications can live anywhere. Complex deployments with too many tools to configure and manage and overwhelmed IT teams lead to mistakes, so organizations should take a cybersecurity mesh platform approach to securing their application journeys.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.