Archive | Sponsor

Recorded Future. Take this short survey to assess your organization's threat intelligence maturity. SPONSOR

Take this short survey to assess your organization’s threat intelligence maturity

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future believes that every security team can benefit from threat intelligence. That’s why it has launched its new Threat Intelligence Grader — so you can quickly assess your organization’s threat intelligence maturity and get best practices for improving it.

Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. It empowers organizations to reveal unknown threats before they impact business, and enables teams to respond to alerts 10 times faster.

To supercharge the efforts of security teams, Recorded Future’s technology automatically collects and analyzes intelligence from technical, open web, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies.

91 percent of the Fortune 100 use Recorded Future.

Try out Recorded Future’s Threat Intelligence Grader for yourself now!


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Recommendations To Enable PSD2-Compliant Transaction Monitoring White Paper. Get your copy for Free! SPONSOR

Recommendations To Enable PSD2-Compliant Transaction Monitoring’ white paper. Get your copy for free!

Many thanks to the great folks at OneSpan, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

Did you know that under the Regulatory Technical Standards for PSD2 (also known as the Revised Payment Services Directive), transaction monitoring is now a requirement for all Payment Service Providers?

Download this new white paper from OneSpan, and discover recommendations to establish a compliant fraud prevention and risk analysis strategy. Topics covered include:

  • The specific requirements regarding mandatory transaction monitoring
  • Possible exemptions from Strong Customer Authentication requirements
  • Recommendations for a PSD2-compliant transaction monitoring solution

Download OneSpan’s free white paper now to learn more.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Considering Electronic Document Signing? Try OneSpan Sign Free For 30 Days SPONSOR

Considering Electronic Document Signing? Try OneSpan Sign Free For 30 Days

Many thanks to the great folks at OneSpan, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

In today’s digital era, more and more organizations choose e-Signature technology as part of their digitization process.

OneSpan Sign is the white-labeled solution behind some of the most trusted brands and security-conscious organizations in the world. The last ten industry reports show that OneSpan Sign received the highest overall customer satisfaction score among e-signature products. 99% of users rated it four or five stars.

Try sending and e-signing documents now, free of charge, and discover how to:

  • Enhance user experience across all channels
  • Increase operational efficiency
  • Meet compliance challenges

Start e-signing in minutes on web and mobile, by signing-up for an Unlimited 30-Day Trial now!


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics. Download free ebook sneak peek today SPONSOR

Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics. Download free ebook sneak peek today

Many thanks to the great folks at Nehemiah Security, who have sponsored my writing for the last week.

Coming this fall, Nehemiah is releasing their newest ebook, “Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics”. This introductory guide arms the modern day cybersecurity leader to put cyber risk into motion and transform cybersecurity operations into a business enabler.

Topics covered in this book include:

  • The end goal of cyber risk analytics
  • Where to gather the right data
  • Key stakeholders involved
  • What it takes to quantify cyber risks financially

Follow this link for a sneak peek into the content and to reserve your copy when the full book is released!


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Buyer’s Guide to Evaluating Fraud Detection & Prevention Tools (White Paper by OneSpan) SPONSOR

Free buyer’s guide to evaluating fraud detection & prevention tools

Many thanks to the great folks at OneSpan, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

The fraud detection and prevention market offers a wide range of tools with a wide range of capabilities, but fraud is an ever-evolving threat. Not every tool can keep up with the new fraud schemes in play today.

Download this guide from OneSpan to gain expert insight on the essential capabilities you need in a fraud detection tool. From machine learning and an advanced rule engine to dynamic authentication flows, learn the nine key requirements to look for when comparing fraud solutions.

Inside, you’ll discover:

  • The nine capabilities you need to combat today’s fraud schemes
  • The value of a layered, context-aware online security approach to fraud detection
  • Why analyzing the mobile device itself is so crucial
  • How to explore the full potential of your data
  • How OneSpan’s Risk Analytics solution meets these requirements

Download OneSpan’s “Buyer’s Guide to Evaluating Fraud Detection & Prevention Tools”.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
8 Industry Best Practices for a Successful Mobile First Strategy (eBook by OneSpan) SPONSOR

8 Industry Best Practices for a Successful Mobile First Strategy (eBook by OneSpan)

Many thanks to the great folks at OneSpan, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

And you can now download OneSpan’s free eBook: “8 Industry Best Practices for a Successful Mobile First Strategy”.

Financial institutions strategically aim for customers to do more with mobile while minimizing fraud exposure tied to untrusted, high-risk devices. To enable growth in the mobile channel, financial institutions need to provide fast, convenient and frictionless high-value services delivered as securely and fraud-proof as possible. Building trust between the bank and the customer is priority one in achieving this goal.

Inside OneSpan’s eBook, you’ll discover how to:

  • Provide a frictionless experience
  • Measure risk on each mobile device
  • Combat social engineering and other threats
  • Simplify document signing
  • Login quickly and securely
  • Adopt an Omni-channel approach
  • Be ready for regulation

Download now: “8 Industry Best Practices for a Successful Mobile First Strategy”.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Read OneSpan's 8-page report on the top six e-Signature use cases in banking SPONSOR

Read OneSpan’s 8-page report on the top six e-Signature use cases in banking

Many thanks to the great folks at OneSpan, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

OneSpan has produced a free report on the top six e‑signature use cases in banking. With it you can learn the most common starting points for e‑signatures, plus the top targets for expanding across the enterprise.

E-signatures are being used in all areas of the bank, from customer-facing transactions to B2B and internal processes.

Some banks start by introducing e-signatures as part of a branch transformation initiative. Others begin in the online channel with high volume, self-serve transactions.

As digitalization efforts mature, it is becoming common for organizations such as U.S. Bank, BMO (Bank of Montreal), RBC (Royal Bank of Canada) and even non-bank lenders like OneMain Financial to expand e-signature capability across all channels, lines of business, mobile apps and more.

OneSpan’s free paper offers guidance to banks of all sizes seeking to answer questions like:

  • What are the common challenges in going digital?
  • What are the latest e-signature adoption and technology trends in banking?
  • Where to start, and what is the best way to expand?

Download the OneSpan White Paper “Top e-Signature Use Cases in Banking” now.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor] SPONSOR

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email, all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research (“reverse engineering,” “proof of concept”) to malicious exploitation (“exploited in the wild,” “weaponized”).
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

I look forward to the Cyber Daily update email every morning to start my day. It’s timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions.” - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you’ll receive the top trending threat indicators.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Discover the State of Authentication and the Evolving Threat Landscape in this White Paper by OneSpan. Get your copy! SPONSOR

Discover the State of Authentication and the Evolving Threat Landscape in this White Paper by OneSpan. Get your copy!

Many thanks to the great folks at OneSpan, who have sponsored my writing for the last week.

Banks and financial institutions find themselves trying to satisfy competing priorities.

Fraud continues to grow at an alarming pace and in sophistication year-over-year. Meanwhile, the consumer’s patience for additional layers of unnecessary security dwindles.

Banks are forced to decide between alienating their customers and leaving them vulnerable to attack. Intelligent adaptive authentication is a new approach to combatting fraud that solves this problem and achieves the twin goals of reducing fraud and delighting the customer.

Read this free white paper from OneSpan to learn:

  • How to equip your bank to better combat fraud through real-time risk analytics
  • Top solution requirements to look for, including open architecture, AI/machine learning, and advanced rule sets
  • The importance of authentication orchestration, risk analytics and mobile app security in achieving a fully optimized digital banking experience

Download the free “Superior User Experience and Growth Through Intelligent Security” white paper now.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Free ebook: If your friend was put in charge of a cyber budget, what advice would you give them? SPONSOR

Free eBook: If your friend was put in charge of a cyber budget, what advice would you give them?

Many thanks to the great folks at Nehemiah Security, who have sponsored my writing for the last week.

If your friend was put in charge of measuring cyber risk at a large company, what advice would you give them?

Nehemiah Security created this guide to advance the risk management conversation amongst cyber professionals.

Many would claim they are able to pinpoint technical cyber risks. But few would profess a high level of confidence that they always deploy their resources to the biggest risks facing the company. Fewer still would say they effectively communicate this to their board.

This eBook will change the way you approach and frame cyber risk conversations within your business.

Download the eBook today!


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Looking for another great cyber podcast? CyberTangent is your new home with expert guests every episode SPONSOR

Looking for another great cyber podcast? CyberTangent is your new home with expert guests every episode

Many thanks to the great folks at Nehemiah Security, who have sponsored my writing for the last week.

Nehemiah Security’s “CyberTangent” is a podcast focused on topics like Security Risk Management, Cyber Risk Analytics, Malware Hunting, and more.

This specific episode of “CyberTangent” features our favorite guest, Graham Cluley himself! In this episode, we get to know Graham a little better, starting with how he got into the cybersecurity space and ending with his “love language.”

Start listening now to “CyberTangent”!


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
12 Common Threat Intelligence Use Cases SPONSOR

12 Common Threat Intelligence Use Cases

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.

Are you using threat intelligence to its full potential?

The term “threat intelligence” is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner “Market Guide for Security Threat Intelligence Products and Services” explains the different use cases and how to best leverage threat intelligence in your organization.

You will learn how to:

  • Identify 12 common threat intelligence use cases.
  • Align these use cases to your specific requirements.
  • Implement strategies for getting value from threat intelligence.
  • Evaluate vendors based on your business needs.

Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Join SC Media for their 12th annual cybersecurity conference, RiskSec, in New York! SPONSOR

Join SC Media for their 12th annual cybersecurity conference, RiskSec, in New York!

Many thanks to the great folks at SC Media, who have sponsored my writing for the last week.

SC Media’s 12th annual security conference, RiskSec (previously branded as SC Congress) will be held May 31 in New York City. This event will provide insights from thought leaders across various industries, focusing on the most significant issues that CISOs and other security professionals face every day.

Features include:

  • Interactive learning sessions
  • Demos from 25 prominent tech companies
  • 30+ industry-leading speakers
  • Ability to earn up to 9 CPE credits
  • Breakfast and lunch from executive chef
  • Cocktail reception

In 2017, there was a record number of massive data breaches that compromised millions of users’ data and cost senior-level executives their jobs. This event is a great opportunity to collaborate and continue to improve defense techniques.

Use discount code CLULEY for $100 off admission.

RiskSec is a selective event for senior security professionals. Space is limited and the event will sell out.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
87% of banks don't identify fraud in real time. Download the '2017 Faces of Fraud Survey' report now! SPONSOR

87% of banks don’t identify fraud in real time. Download the ‘2017 Faces of Fraud Survey’ report now!

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

The 2017 Faces of Fraud Survey, conducted by iSMG, the world’s largest media organization devoted solely to information security and risk management, delivers revealing insights into the sector’s challenges in fraud practices and strategies, and underscores the growing vulnerability of mobile channels.

The 2017 Faces of Fraud Survey was commissioned by VASCO and compiled with responses from banking and security leaders representing financial institutions ranging from under $500 million to more than $20 billion in assets. Key findings include:

  • 52 percent say today’s fraud schemes are too sophisticated and evolve too quickly to keep pace
  • Only 38 percent have high confidence in their organization’s ability to detect and prevent fraud
  • Almost half identify technical barriers or controls not talking to one another as a top challenge to improving enterprise fraud
  • 41 percent do not want to add new anti-fraud controls that might negatively impact the customer experience
  • 35 percent say they are countering mobile exploits with multifactor authentication
  • Just 13 percent believe they are identifying fraud in real time

Download the 2017 Faces of Fraud Survey, a 27-page report that documents how leaders in the banking and security industries are preparing for fraud. Roughly 250 banking/security leaders participated in this survey, which was conducted to determine:

  • The top forms of fraud afflicting financial organizations in 2017
  • The biggest gaps in organizations’ efforts to detect and prevent fraud
  • What organizations are doing to counter the surge in mobile exploits

Get your copy of the full report now.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Calling all ethical hackers! VASCO launches bug bounty program. Learn more and sign-up! SPONSOR

Calling all ethical hackers! VASCO launches bug bounty program. Learn more and sign-up!

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

Security is of utmost importance to VASCO, as is maintaining a high security bar for its products and cloud services.

That’s why VASCO has launched a bug bounty program to expand the security evaluation of its products beyond its walls and tap into the large pool of highly skilled ethical hackers outside its company.

The bug bounty program currently consists of two projects:

  • The server-side project covers VASCO’s IDENTIKEY Authentication Server and IDENTIKEY Risk Manager products.
  • The mobile project covers two mobile authentication apps, namely DIGIPASS for Mobile and the DIGIPASS app, which are available for iOS and Android. Some of these apps are protected using VASCO’s application shielding technology.

VASCO will be adding more products and cloud services in the future.

Learn more on blog.vasco.com and sign up!

Read more...
How does Behavioral Biometrics help financial institutions manage fraud risk? Download VASCO’s white paper now SPONSOR

How does Behavioral Biometrics help financial institutions manage fraud risk? Download VASCO’s white paper now

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

Before the internet, customers who wanted to perform a bank transaction had only one option - a visit to their local branch for a face-to-face transaction.

Now, in the “mobile age,” customers expect that their bank provide secure and easy access to the full suite of banking services via their mobile device. The availability of transparent, risk-based online authentication tools, such as behavioral biometrics, then, comes at a critical time.

By downloading this free white paper, you’ll learn:

  • The critical challenges financial institutions face when authenticating an increasingly mobile customer base
  • How to establish a risk-based approach to online security
  • How behavioral biometrics helps financial institutions manage fraud risk, improve the user experience, increase customer
  • loyalty, satisfy regulatory requirements, and deliver a frictionless, cross-channel user experience

Interested in learning more? Download VASCO’s white paper: Behavioral Biometrics: Improve Security and the Customer Experience


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...