Blog Archives

Cyberlitica – 8 Ways Hackers Monetize Stolen Data

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
Create a Repository of the Stolen Data

Hackers start by taking an inventory of what was stolen. They will look through the stolen data files for the victim’s authentication credentials,

Read more ›

Posted in Cybersecurity, Fraud, Hacks
Tags: , , , , ,

Encryption Isn’t Going Away

Encryption App Gains Popularity Amid Apple Privacy Battle

By Steve Rosenbush for WSJ

The battle between Apple Inc. and the FBI over an encrypted iPhone used by one of the San Bernardino terrorists could be meaningful to that particular investigation. Perhaps, if the FBI wins, and Apple unencrypts the phone,

Read more ›

Posted in Content, Cybersecurity, Encryption, Governance, Governent Oversight, Government Surveilance, ID Theft, Layered Defense, Legal, Regulatory, spyware
Tags: , , , , , , , , , , ,

SMLR and MIS Launch Partnership

SMLR Group and Merchants Information Solutions, Inc.
Announce a New Strategic Partnership

New Strategic Partnership brings Merchants industry leading SmartIDentity for Business Data Breach Solution to SMLR Group clients.

February 11th, 2016 SMLR Group Press Release – SMLR Group and Merchants Information Solutions,

Read more ›

Posted in Compliance, Content, Customer Engagement, Cyber-Insurance, Cybersecurity, Data Security, Partnerships, Privacy, Risk Management
Tags: , , , , , , ,

ID Theft Protection

ID Theft Protection Services Create False Sense of Security

Mark Pribish, Special for The Republic | azcentral.com 12:51 p.m. MST November 13, 2015
Millions of consumers are spending more than $3 billion a year on monitoring services to protect from ID theft.

Read more ›

Posted in Breach, Compliance, Content, Fraud, ID Theft, Legal, Malware, Multi-Factor Authentication, Risk Management
Tags: , , , , , , , , ,

E*Trade, Dow Jones: 7 Breach Lessons

Why Fraudsters Target Personally Identifiable Information

Two more firms in the financial services sector – E*Trade Financial and Dow Jones – have announced that they suffered data breaches that appeared to target not payment card data,

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Fraud, HIPAA, Incident Response, Legal, Risk Management
Tags: , , , , , ,

Data and (Deep) Machine Learning

Trend to Watch Closely: Data and (Deep) Machine Learning

May 28, 2015 by: Rajat Taneja Executive Vice President, Technology at Visa

Over the course of my career I have been very fortunate to have been part of three secular trends that changed the way we work and interact.

Read more ›

Posted in Big Data, Data Solutions, Data Structure, Fraud, Machine Learning, Optimization
Tags: , , , , , ,

Why Cyberfy Beats the Competition

Cyberfy: The Future of Smart Phone ID Authentication

by: Yona Fink, CEO Cyberfy

The field is quickly filling up with biometric ID authentication apps, but Cyberfy still holds a lead. Why?

Apple’s Touch ID and EyeVerify (both of which I know,

Read more ›

Posted in Content, Cybersecurity, Encryption, Fraud, Layered Defense, Legal, Mobile, Risk Management
Tags: , , , , , , , ,

Is Continuous Monitoring Enough?

The Insider Threat and Continuous Monitoring – Just One Piece of the Puzzle

by: Theresa Wood  for TripWire

Continuous monitoring is poised to do for information security what cloud deployment did for global productivity. Continuous monitoring not only has a role to play in preventing large-scale data breaches but it can also help compliance-sensitive organizations save money by facilitating long-term compliance continuity and reducing annual audit overhead.

Read more ›

Posted in Content, Continuous Monitoring, Cybersecurity, Hacks, Incident Response, Insider Threats, Phishing, Risk Management
Tags: , , , , , , , , ,

Law Firm Cybersecurity and Privacy Risks

Law Firm Catastophic Risks at an 11 out of 10

by: Prof. Daniel Solove

Law firms are facing grave privacy and security risks. Although a number of firms are taking steps to address these risks, the industry as a whole needs to grasp the severity of the risk.

Read more ›

Posted in Compliance, Cybersecurity, Incident Response, Insider Threats, Layered Defense, Legal, Malware, Risk Management
Tags: , , , , , , , , , , , , ,

Fighting Cybercrime

Cybercrime and Digital Forensic Investigation: A Winning Combination

by Suhali Nanji, Area Director Southeast Region, SMLR Group, Inc.

Cyber insurance is one way organizations can fight cybercrime. Behind the scenes, however, laws and sentencing are getting tighter in response to the rise in cyber-attacks, while experts are creating more precise ways to identify cyber criminals.

Read more ›

Posted in Cybersecurity, Financials, Forensic Social Media, Fraud, Hacks, Incident Response, Legal, Malware, Malware & Other Threats, Phishing, Risk Management
Tags: , , , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: