Protecting financial institutions in the era of AI-driven threats

Protecting financial institutions in the era of AI-driven threats

As open-source AI tools become more accessible, ransomware attacks are growing increasingly sophisticated. Scammers are now using AI in targeted spear phishing attacks, where highly personalized information is used to gain access to medical or financial information.  Financial service organizations are particularly at risk when it comes to these kinds of attacks — not only do they hold and exchange large sums of money, they also store and process highly sensitive information of their customers. …

Read More

Is your financial data safe this tax season?

Is your financial data safe this tax season?

Tax season is always a stressful time, and with the IRS tax deadline just around the corner, many individuals and businesses are rushing to get their returns filed in time. In this scramble, it’s easy to overlook the plethora of serious privacy and security concerns surrounding the sensitive financial data entrusted to tax preparation companies.  There are few documents more personal and sensitive than a tax return, which is why you shouldn’t trust just any…

Read More

Ryan Field | Top Cybersecurity Leaders 2024

Ryan Field | Top Cybersecurity Leaders 2024

From protecting sensitive financial data to serving his country, Ryan Field has dedicated his career to cybersecurity, leading innovative programs to secure systems and develop the next generation of experts in the field. Ryan Field was hired into the security field straight out of college, working at PricewaterhouseCoopers (PwC) in IT Security assessments, including penetration testing. This inspired Field to pursue his master’s, wanting to learn more about cybersecurity. After attending Harvard, Field continued to…

Read More

The pros and cons for AI in financial sector cybersecurity

The pros and cons for AI in financial sector cybersecurity

Much has been written about the threats and perils artificial intelligence (AI) poses to financial services and how it can be used by cybercriminals to infiltrate customer accounts. In an industry already plagued by constant fraud concerns, where it’s predicted that the global cost of fraud will surpass $40 billion by 2027, the explosive popularity of AI, and the additional hazards it presents, have not necessarily been met with widespread enthusiasm across the sector. Because…

Read More

Jennifer Williams | Most Influential People in Security 2023

Jennifer Williams | Most Influential People in Security 2023

Jennifer Williams | Most Influential People in Security 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

U.S. Treasury assesses cloud-based technology

U.S. Treasury assesses cloud-based technology

U.S. Treasury assesses cloud-based technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Damiano Tulipani named CISO at Provident Bank

Damiano Tulipani named CISO at Provident Bank

Damiano Tulipani named CISO at Provident Bank | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Best practices for cryptocurrency fraud investigations

Best practices for cryptocurrency fraud investigations

Best practices for cryptocurrency fraud investigations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Michael Neuman named CISO at Backstop

Michael Neuman named CISO at Backstop

Michael Neuman named CISO at Backstop | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

CISOs rank their top security priorities through 2025

CISOs rank their top security priorities through 2025

CISOs rank their top security priorities through 2025 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2 3