Adapting your fraud strategy to meet customer expectations

Adapting your fraud strategy to meet customer expectations

Adapting your fraud strategy to meet customer expectations | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Fraudsters bank on targeted, high-value attacks during 2020 holiday shopping season

Fraudsters bank on targeted, high-value attacks during 2020 holiday shopping season

Fraudsters bank on targeted, high-value attacks during 2020 holiday shopping season | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Future-proofing data against hackers

Future-proofing data against hackers

Future-proofing data against hackers | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Card-Not-Present: Security Considerations for Point of Sale Businesses

Card-Not-Present: Security Considerations for Point of Sale Businesses

As the retail world’s center of gravity shifts to the cloud, payment card fraud has followed suit. According to Verizon’s retail vulnerabilities study, attacks against e-commerce applications are by far the leading cause of retail data breaches. This trend mirrors similar outcomes in other industries, like food service. A complimentary Verizon study finds remote attacks against food service operators on the rise, as well. In both industries, the swing to card-not-present (CNP) fraud has been…

Read More

How can I automate a MAC address interface report?

How can I automate a MAC address interface report?

Hank and the Automation Trolley are here to help with your questions! As 2020 was wrapping up I got a great question in over email from a customer I’d been exchanging ideas on automation with for a bit.  It was just the perfect project and distraction to work on as I got ready to start my holiday break. The gist of the question is: We’ve a need to grab the IP table off our core,…

Read More

How to address security fatigue and stop cybercriminals from winning

How to address security fatigue and stop cybercriminals from winning

Security fatigue and negative social influences give digital bad guys the advantage. Experts offer tips on how to solve this cybersecurity issue. Image: iStock/nensuria You may be familiar with the tech saying, “It’s not if, but when.” That saying is no longer apropos. It has been replaced with “It’s not when, but how often.” One reason for lost optimism is the uncanny ability of cybercriminals to manipulate their victims.  Troy La Huis and Michael Salihoglu…

Read More

Don’t let a data breach sink your business: Here’s what you need to know

Don’t let a data breach sink your business: Here’s what you need to know

Experts offer insights about the legal and financial hits, as well as the devastating loss of reputation, your business might suffer if it is the victim of a data breach. Image: MangoStar_Studio, Getty Images/iStockphoto The consequences of a data breach involve a complex sequence of events specific to the victimized business and its responsibilities to regulators, governments, and customers. A report from Veritas said some people believe CEOs should be held responsible for ransomware attacks,…

Read More

Terrorism and security threat trends in 2021

Terrorism and security threat trends in 2021

Terrorism and security threat trends in 2021 | 2020-12-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The top stories of 2020

The top stories of 2020

The top stories of 2020 | 2020-12-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

UK lawmakers propose law banning retail bots after PS5 fiasco

UK lawmakers propose law banning retail bots after PS5 fiasco

The legislation would both ban the resale of goods acquired using bots and the resale of tech products above the manufacturers’ price. Image: iStock/Girts Ragelis A group of lawmakers in the United Kingdom are looking to take on powerful bot organizations openly scalping gaming consoles by proposing potential legislation that would both ban the resale of goods acquired using bots and ban the resale of tech products above the manufacturers’ price.  More about artificial intelligence…

Read More
1 3,319 3,320 3,321 3,322 3,323 3,467