Sponsor

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week. Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web. And now, with its FREE Cyber Daily email, all IT security professionals can access information


1 min read

Discover the State of Authentication and the Evolving Threat Landscape in this White Paper by OneSpan. Get your copy!

Many thanks to the great folks at OneSpan, who have sponsored my writing for the last week. Banks and financial institutions find themselves trying to satisfy competing priorities. Fraud continues to grow at an alarming pace and in sophistication year-over-year. Meanwhile, the consumer’s patience for additional layers of unnecessary security dwindles. Banks are forced to


40 sec read

Free eBook: If your friend was put in charge of a cyber budget, what advice would you give them?

Many thanks to the great folks at Nehemiah Security, who have sponsored my writing for the last week. If your friend was put in charge of measuring cyber risk at a large company, what advice would you give them? Nehemiah Security created this guide to advance the risk management conversation amongst cyber professionals. Many would


30 sec read

Looking for another great cyber podcast? CyberTangent is your new home with expert guests every episode

Many thanks to the great folks at Nehemiah Security, who have sponsored my writing for the last week. Nehemiah Security’s “CyberTangent” is a podcast focused on topics like Security Risk Management, Cyber Risk Analytics, Malware Hunting, and more. This specific episode of “CyberTangent” features our favorite guest, Graham Cluley himself! In this episode, we get


23 sec read

12 Common Threat Intelligence Use Cases

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week. Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks. Are you using threat intelligence to its full potential? The term “threat intelligence” is often misunderstood


39 sec read

Join SC Media for their 12th annual cybersecurity conference, RiskSec, in New York!

Many thanks to the great folks at SC Media, who have sponsored my writing for the last week. SC Media’s 12th annual security conference, RiskSec (previously branded as SC Congress) will be held May 31 in New York City. This event will provide insights from thought leaders across various industries, focusing on the most significant


38 sec read

87% of banks don’t identify fraud in real time. Download the ‘2017 Faces of Fraud Survey’ report now!

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week. The 2017 Faces of Fraud Survey, conducted by iSMG, the world’s largest media organization devoted solely to information security and risk management, delivers revealing insights into the sector’s challenges in fraud practices and strategies, and underscores the growing


1 min read

Calling all ethical hackers! VASCO launches bug bounty program. Learn more and sign-up!

More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems. Security is of utmost importance to VASCO, as is maintaining a high security bar for its products and cloud services. That’s why VASCO has launched a bug bounty


33 sec read

How does Behavioral Biometrics help financial institutions manage fraud risk? Download VASCO’s white paper now

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week. More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems. Before the internet, customers who wanted to perform a bank transaction


45 sec read

How does Behavioral Biometrics help financial institutions manage fraud risk? Download VASCO’s white paper now

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week. More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems. Before the internet, customers who wanted to perform a bank transaction


45 sec read

Open Banking APIs under PSD2: What are the security threats and solutions? Download VASCO’s white paper now

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week. More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems. The Revised Payment Services Directive, also known as PSD2, requires European


54 sec read

We all have a natural human tendency to trust… Be prepared! Download VASCO’s “Social Engineering” eBook

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week. Social engineering is certainly not a new problem, but it’s a persistent one that continues to grow, and with seemingly no end in sight. Social engineering preys on a natural human tendency to trust. Hackers are expert at


52 sec read

How are you going to protect the next generation of your Mobile Applications?

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week. Today business growth means providing more services to more customers anytime and anywhere they choose. This is driving an explosive growth in mobile apps. Of course, criminals are hard at work crafting malware to steal data and money


38 sec read

See a real attack on a virtual network in this free webinar by Nehemiah Security

Many thanks to the great folks at Nehemiah Security, who have sponsored my writing for the last week, and continue to do so for the next few weeks. Nehemiah Security operates throughout an enterprises’ network to make security operations – and the business – run better. Security teams struggle to quantify the protection levels of


37 sec read

Free Invisible Mobile App Security white paper from VASCO

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week. Mobile apps are hard to secure because they are often written with no built-in security. Delivering secure mobile apps requires invisible technologies, which assesses the integrity of the mobile app, and behaviometrics, which accurately authenticates users by the


38 sec read

Strong customer authentication and risk analysis under PSD2: how to comply? Download VASCO’s white paper

Many thanks to the great folks at VASCO, who have sponsored my writing for the last week. More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems. On Thursday February 23rd, the European Banking Authority (EBA) published its


40 sec read