Archive | Sponsor

Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor] SPONSOR

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
87% of banks don't identify fraud in real time. Download the '2017 Faces of Fraud Survey' report now! SPONSOR

87% of banks don't identify fraud in real time. Download the '2017 Faces of Fraud Survey' report now!

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

The 2017 Faces of Fraud Survey, conducted by iSMG, the world's largest media organization devoted solely to information security and risk management, delivers revealing insights into the sector’s challenges in fraud practices and strategies, and underscores the growing vulnerability of mobile channels.

The 2017 Faces of Fraud Survey was commissioned by VASCO and compiled with responses from banking and security leaders representing financial institutions ranging from under $500 million to more than $20 billion in assets. Key findings include:

  • 52 percent say today’s fraud schemes are too sophisticated and evolve too quickly to keep pace
  • Only 38 percent have high confidence in their organization’s ability to detect and prevent fraud
  • Almost half identify technical barriers or controls not talking to one another as a top challenge to improving enterprise fraud
  • 41 percent do not want to add new anti-fraud controls that might negatively impact the customer experience
  • 35 percent say they are countering mobile exploits with multifactor authentication
  • Just 13 percent believe they are identifying fraud in real time

Download the 2017 Faces of Fraud Survey, a 27-page report that documents how leaders in the banking and security industries are preparing for fraud. Roughly 250 banking/security leaders participated in this survey, which was conducted to determine:

  • The top forms of fraud afflicting financial organizations in 2017
  • The biggest gaps in organizations' efforts to detect and prevent fraud
  • What organizations are doing to counter the surge in mobile exploits

Get your copy of the full report now.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Calling all ethical hackers! VASCO launches bug bounty program. Learn more and sign-up! SPONSOR

Calling all ethical hackers! VASCO launches bug bounty program. Learn more and sign-up!

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

Security is of utmost importance to VASCO, as is maintaining a high security bar for its products and cloud services.

That's why VASCO has launched a bug bounty program to expand the security evaluation of its products beyond its walls and tap into the large pool of highly skilled ethical hackers outside its company.

The bug bounty program currently consists of two projects:

  • The server-side project covers VASCO’s IDENTIKEY Authentication Server and IDENTIKEY Risk Manager products.
  • The mobile project covers two mobile authentication apps, namely DIGIPASS for Mobile and the DIGIPASS app, which are available for iOS and Android. Some of these apps are protected using VASCO’s application shielding technology.

VASCO will be adding more products and cloud services in the future.

Learn more on blog.vasco.com and sign up!

Read more...
How does Behavioral Biometrics help financial institutions manage fraud risk? Download VASCO’s white paper now SPONSOR

How does Behavioral Biometrics help financial institutions manage fraud risk? Download VASCO’s white paper now

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

Before the internet, customers who wanted to perform a bank transaction had only one option - a visit to their local branch for a face-to-face transaction.

Now, in the "mobile age," customers expect that their bank provide secure and easy access to the full suite of banking services via their mobile device. The availability of transparent, risk-based online authentication tools, such as behavioral biometrics, then, comes at a critical time.

By downloading this free white paper, you'll learn:

  • The critical challenges financial institutions face when authenticating an increasingly mobile customer base
  • How to establish a risk-based approach to online security
  • How behavioral biometrics helps financial institutions manage fraud risk, improve the user experience, increase customer
  • loyalty, satisfy regulatory requirements, and deliver a frictionless, cross-channel user experience

Interested in learning more? Download VASCO's white paper: Behavioral Biometrics: Improve Security and the Customer Experience


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
How does Behavioral Biometrics help financial institutions manage fraud risk? Download VASCO’s white paper now SPONSOR

How does Behavioral Biometrics help financial institutions manage fraud risk? Download VASCO’s white paper now

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

Before the internet, customers who wanted to perform a bank transaction had only one option - a visit to their local branch for a face-to-face transaction.

Now, in the "mobile age," customers expect that their bank provide secure and easy access to the full suite of banking services via their mobile device. The availability of transparent, risk-based online authentication tools, such as behavioral biometrics, then, comes at a critical time.

By downloading this free white paper, you'll learn:

  • The critical challenges financial institutions face when authenticating an increasingly mobile customer base
  • How to establish a risk-based approach to online security
  • How behavioral biometrics helps financial institutions manage fraud risk, improve the user experience, increase customer
  • loyalty, satisfy regulatory requirements, and deliver a frictionless, cross-channel user experience

Interested in learning more? Download VASCO's white paper: Behavioral Biometrics: Improve Security and the Customer Experience


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Open Banking APIs under PSD2: Security Threats and Solutions. Download this free white paper SPONSOR

Open Banking APIs under PSD2: What are the security threats and solutions? Download VASCO's white paper now

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

The Revised Payment Services Directive, also known as PSD2, requires European banks to provide communication interfaces to Third Party Providers (TPPs).

These interfaces, generally referred to as APIs, will allow TPPs to build innovative financial services on top of the services of the banks. The requirements for these interfaces are defined in the Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and Common and Secure Communication (CSC), of which the European Banking Authority (EBA) published a draft version in February 2017.

In this whitepaper VASCO analyzes the requirements for the communication interface as defined in the draft RTS, with a special emphasis on security requirements. VASCO identifies the most important security threats against these interfaces, and discuss various solutions that can help banks to protect against them.

By downloading this free white paper, you’ll discover:

  • the PSD2 requirements for open banking APIs
  • the security and privacy threats against the APIs of banks
  • how to protect APIs against security threats
  • VASCO's solution suite for PSD2 compliance

Interested in learning more? Download VASCO's white paper: Open Banking APIs under PSD2: What are the security threats and solutions?


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
We all have a natural human tendency to trust... Be prepared! Download VASCO's "Social Engineering" eBook SPONSOR

We all have a natural human tendency to trust... Be prepared! Download VASCO's "Social Engineering" eBook

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

Social engineering is certainly not a new problem, but it’s a persistent one that continues to grow, and with seemingly no end in sight.

Social engineering preys on a natural human tendency to trust. Hackers are expert at manipulating the human factor and exploiting trust to steal valuable information. They accomplish this by convincing their victims to divulge confidential information or participate unknowingly in fraudulent transactions.

While most financial institutions have taken significant steps to combat social engineering through user education and additional controls for their customers, they still find themselves struggling to identify new attack methods and mitigate the damage.

Traditional phishing schemes are increasing in frequency and more targeted spear phishing attacks are as well. As customers migrate to additional channels, hackers are following them with threats such as voice phishing (Vishing) and SMS phishing (SMishing).

Education and enhanced security are the best defenses against hackers and social engineering attacks. To arm you for the battle, download VASCO's "Social Engineering" eBook and you'll discover:

  • The latest social engineering attack methods
  • The transaction authorization weaknesses
  • How to minimize the risk of social engineering attacks
  • Industry best practices and use cases

Get your free copy of VASCO's "Social Engineering" eBook now!


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
How are you going to protect the next generation of your Mobile Applications? SPONSOR

How are you going to protect the next generation of your Mobile Applications?

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

Today business growth means providing more services to more customers anytime and anywhere they choose.

This is driving an explosive growth in mobile apps. Of course, criminals are hard at work crafting malware to steal data and money from unsuspecting users.

The best way to protect your app's users is to integrate VASCO's RASP (Runtime Application Self-Protection) security technology.

Learn more, watch a video explanation, and download VASCO's free white paper where you will discover:

  • Which intrusions RASP can detect and prevent
  • How natively integrated RASP technology strengthens mobile applications
  • How RASP bridges the divide between infrastructure and app server owners
  • Why applications secured with RASP result in a lower cost, higher benefit ratio

Runtime application self-protection is critical for next generation app security, so learn more now, watch the video and download VASCO's free white paper.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
See a real attack on a virtual network SPONSOR

See a real attack on a virtual network in this free webinar by Nehemiah Security

Many thanks to the great folks at Nehemiah Security, who have sponsored my writing for the last week, and continue to do so for the next few weeks.

Nehemiah Security operates throughout an enterprises' network to make security operations - and the business - run better.

Security teams struggle to quantify the protection levels of their networks, endpoints and data assets. Nehemiah Security's AtomicEye RQ (Risk Quantifier) provides organizations with a security scorecard as well as actionable suggestions on how to better resist a vast range of cyberattacks.

Watch the free webinar to see AtomicEye RQ:

  • Virtualize a complex environment
  • Prepare an experiment using real exploits
  • Launch the attack
  • Quantify the results

Can you justify your security spend?

See how AtomicEye RQ can help you measure security risks in both cyber and financial terms, then calculate the benefits of specific changes - before you invest to implement them.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Free Invisible Mobile App Security white paper from VASCO SPONSOR

Free Invisible Mobile App Security white paper from VASCO

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

Mobile apps are hard to secure because they are often written with no built-in security. Delivering secure mobile apps requires invisible technologies, which assesses the integrity of the mobile app, and behaviometrics, which accurately authenticates users by the unique way they interact with their device. The net result is a more secure and frictionless mobile transaction experience.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

Download VASCO's 10-page white paper to learn how to:

  • Use Layered Protection Techniques
  • Identify & Block Malware Attacks in Real-Time
  • Integrate Biometric Authentication
  • Fortify the authentication chain from app through device
  • Secure the mobile app with invisible security

Interested in learning more? Download VASCO's white paper about Invisible Security Technologies and Behaviometrics now.


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Strong customer authentication and risk analysis under PSD2: how to comply? Download VASCO's white paper SPONSOR

Strong customer authentication and risk analysis under PSD2: how to comply? Download VASCO's white paper

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

On Thursday February 23rd, the European Banking Authority (EBA) published its long-awaited final draft Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and Common and Secure Communication (CSC) under the revised Payment Services Directive (PSD2).

In this VASCO white paper on Strong Customer Authentication and Risk Analysis under PSD2 you will discover:

  • Background information about the history of the final draft RTS
  • Common authentication solutions that are used by many online banking and mobile banking applications today
  • The most important requirements from the final draft RTS
  • Which authentication solutions are most likely to meet the requirements of the final draft RTS

Interested in learning more? Download VASCO's white paper: Strong customer authentication and risk analysis under PSD2: how to comply?


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Strong customer authentication and risk analysis under PSD2: how to comply? Download VASCO's white paper SPONSOR

Strong customer authentication and risk analysis under PSD2: how to comply? Download VASCO's white paper

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

On Thursday February 23rd, the European Banking Authority (EBA) published its long-awaited final draft Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and Common and Secure Communication (CSC) under the revised Payment Services Directive (PSD2).

In this VASCO white paper on Strong Customer Authentication and Risk Analysis under PSD2 you will discover:

  • Background information about the history of the final draft RTS
  • Common authentication solutions that are used by many online banking and mobile banking applications today
  • The most important requirements from the final draft RTS
  • Which authentication solutions are most likely to meet the requirements of the final draft RTS

Interested in learning more? Download VASCO's white paper: Strong customer authentication and risk analysis under PSD2: how to comply?


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Help prevent a breach in your organisation by watching these Microsoft Office webcasts SPONSOR

Help prevent a breach in your organisation by watching these Microsoft Office webcasts

Many thanks to the great folks at Microsoft Office, who have sponsored my writing for the last week.

Most of us recognise that things have changed a lot in the workplace in the last ten years or so. The concept of the network perimeter has become a lot fuzzier as staff increasingly work remotely, and as companies take advantage of cloud-based technologies and third-party services.

Why does this matter for security? It matters because some businesses have failed to keep up with the changing world, continuing to depend upon a perimeter-based network security approach.

A failure to adapt means your company could be failing to stay ahead of malicious hackers - hackers who have become more sophisticated and organised in their attacks, hell bent on identifying and targeting the weakpoints in infrastructure in order to steal data.

Technology is certainly changing how we secure businesses from attack. But there's one thing that is not going to change any time soon - the human element. You should never underestimate the potential damage that could be caused by the insider threat - and yet managing the "people" part of security is one of the biggest problems IT teams can face today.

You can help your company stay ahead of these challenges by checking out some of the webcasts that Microsoft Office has produced as part of its Modern Workplace series.

Recent episodes have focused on cyber intelligence - specifically how you can help prevent a breach, and an examination of how employees can pose the biggest threat to an organisation's security.

In the webcasts, CISOs share their expertise by describing the sometimes simple steps that can be taken to motivate your staff to work together in proactively helping to prevent a successful hack attack. And if you register on the site you'll also be gain access to exclusive white papers and ebooks describing the top techniques used by hackers.

Don't delay. Check out the webcasts, and start learning more about how you and your staff can be work together better to prevent security breaches in future.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Realistic crisis simulations are the backbone of cyber preparedness - ENISA plays a role in EU cyber preparedness SPONSOR

Realistic crisis simulations are the backbone of cyber preparedness - ENISA plays a role in EU cyber preparedness

Many thanks to the great folks at ENISA, who have sponsored my writing for the last week.

Regular readers of this blog will be more than familiar with the myriad of cyber threat and vulnerabilities which internet users are unknowingly faced with on a daily basis. But recently, the topic of cybersecurity has been dominating the headlines of more than just tech-focused outlets. From concerns about the targeting of critical infrastructure, to increasingly-substantiated accusations around nation-state hacking of electoral systems, cybersecurity is no longer a niche topic, but a matter for far wider public concern.

With this in mind, it is essential that Europe be as prepared as possible to mitigate ever-evolving cyber threats. They say there’s no substitute for experience – but that doesn’t mean learning on the job. Instead of waiting for the next cyber crisis to strike just so we can learn lessons, we prefer another motto: practice makes perfect.

Realistic crisis simulations are the backbone of cyber preparedness efforts. With just enough unknown variables to keep participants on their toes, without actually jeopardising their operations, a cyber exercise allows security experts to test their capacity for problem-solving, troubleshooting and crisis management in a realistic timeframe but a non-hostile environment.

We need the practice. Europe’s economic welfare is increasingly rooted in its provision and exploitation of digital services. This provides massive opportunities for growth, job creation and social prosperity. But it also makes us a prime target for cyber criminals looking to perform industrial reconnaissance, tamper with customer data, manipulate stock markets, or even sabotage critical infrastructures.

At the EU Agency for Network and Information Security (ENISA), we want as many people as possible to get this practice in. That’s why, every two years, we organise the EU’s largest and most comprehensive cybersecurity exercise, Cyber Europe.

(more…)

Read more...
Wandera has uncovered a number of severe mobile data exposures that affect a high proportion of enterprises. Try it now for free. SPONSOR

Wandera has uncovered severe mobile data exposures that affect a high proportion of enterprises. Try it now for free

Many thanks to the great folks at Wandera, who have sponsored my writing for the last week.

Wandera's 2017 Mobile Leak Report found more than 200 mobile websites and apps leaking personally identifiable information across a range of categories – including those that are essential for work. Your employees might have been exposed to credit card theft, identity theft, or even the re-use of login credentials to access a corporate network.

Read the 2017 Mobile Leak Report to see which types of apps present the highest risk to your sensitive corporate data.

Mobile is indisputably the new frontier for cyber threats, as adoption of corporate mobility continues to grow, so too does the number of attacks. Businesses have become increasingly exposed to new threats, vulnerabilities and data leaks.

Wandera provides enterprise-grade threat defense against these mobile security risks, keeping devices secure across all four levels of protection as identified by Gartner. Try Wandera for free to assess and understand what is happening with your mobile data.

Wandera works with some of the biggest and best-loved brands in the world. Find out how your business could also benefit by having devices protected and managed at the data-level.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Free VASCO white paper: PSD2 - Which strong authentication and transaction monitoring solutions comply? SPONSOR

Free VASCO white paper: PSD2 - Which strong authentication and transaction monitoring solutions comply?

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

In this VASCO white paper on PSD2, the revised directive on payment services, you will discover:

  • The proposal for draft Regulatory Technical Standards (RTS) for strong customer authentication (SCA) which have been published in August 2016 by the European Banking Authority (EBA).
  • Background information about the draft RTS.
  • Common authentication solutions that are used by many online banking and mobile banking applications today.
  • The actual requirements from the draft RTS.
  • To which extend current authentication solutions meet the requirements in the draft RTS.

Interested in learning more? Download VASCO's white paper: PSD2 - Which strong authentication and transaction monitoring solutions comply?


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...