Economic turmoil, triggered by the global spread of COVID-19, is increasing and accelerating opportunistic, premeditated and organized insurance fraud. Criminals who invent claims will spend time to discern how to best exploit the weaknesses of an insurer’s fraud defenses. Customers and agents are learning how to...
This paper will lay out key steps to help organisations sensibly adopt a better data protection posture and with it, build a firm foundation towards onward compliance. The key principles of Classification by Design will be introduced as a logical, yet robust start point. We summarize with the overarching takeaway that...
A centralized log strategy has become an essential component in the administration of today’s complex IT environments.
Since log management data is central to the analysis of securing IT enterprise services, understanding operational
performance of IT infrastructure and applications, and key to meeting data...
Organizations must adopt a new approach to security automation that's tailor-made to address today's threats, says Joseph Blankenship, vice president and research director at Forrester.
Adam Turteltaub, chief engagement and strategy officer at the Society of Corporate Compliance and Ethics, says compliance teams should create a dashboard of data that will help keep track of actions taken by staff members who are working remotely.
Building a cyber-resilient enterprise requires several key steps, including wider use of analytics, addressing security earlier in software development and improving the search for indicators of compromises, according to a panel of experts.
An evolving workplace, greater reliance on IoT and the cloud, and already we have seen the new face of supply chain attacks. This is the backdrop for 2021, and Imperva's Brian Anderson offers insights into the cyber-attack outlook.
To improve compliance efforts, organizations can turn to a number of technologies, including data analytics. Two experts share their views on making the most of automation and integration tools.
As more businesses move to agile methodologies, providing more online services to customers and exposing data and APIs, the need for “Shifting Left” and building security into the start of the (continuous) development cycle grows every day. CIOs and CISOs need to think carefully about when, where and how to deploy...
Authorized push payment fraud is expected to continue to surge in 2021. PJ Rohall, co-founder of the website About-Fraud, says behavioral analytics can play an important role in mitigating the risk.
A quarter of a century of digital transformation, accelerated by the COVID-19 pandemic, has led us into the data age. However, a new global survey finds that most organizations are not ready for these new waves of data emerging from new digital technologies.
Taking a closer look at organizations in France. Most are...
To help prevent fraud, banks must leverage technologies such as behavioral analytics, device biometrics and one-time passcodes, says Nancy Guglielmo, senior vice president at the Bank Policy Institute.
The Reserve Bank of India's "New Umbrella Entity" initiative, designed to support a digital retail payments system similar to National Payments Corp. of India, would be a game-changer to boost digital innovation in the payments industry, according to a panel of experts.
Data is one of the most improperly used and mismanaged assets of any organization. It comes in a dizzying array of unpredictable formats, volumes and velocity. But it contains powerful business and operational insights that can help you quickly diagnose service problems, detect advanced security threats and even...
According to analysts, adaptive authentication is at the top of the list of authentication investments for banks - and for good reason.
Download this white paper to learn how financial institutions are using this technology to drive growth and improve customer retention.
Learn how to:
Foster growth by building more...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.