Security

CHECK FRAUD EXPLAINED BY ONE OF HOLLYWOOD’S MOST INFAMOUS CONMEN

Frank Abagnale, Jr. may not be a household name, but the movie Catch Me If You Can made him famous for cashing bad checks. $2,500,000 worth of bad checks in 26 countries, to be exact. Leonardo DiCaprio played the role…

Robust biometric security for New Zealand’s RealMe verified identity

The Challenge The RealMe verified identity is a government-issued digital identity that New Zealanders can use to prove who they are online for a range of purposes, from opening a bank account to applying for student loans. A RealMe verified…

Partnering for success with Polarify: passwordless authentication and e-KYC for Japan

The ChallengeThe security and usability challenges associated with customer authentication are well-known, especially to banks, which tend to enforce long, complex and frequently changing alphanumeric passwords; or, they may use One Time Passwords or combinations of techniques that represent user…

HERTA Security Protects IP, Encrypts Data and Creates New Revenue Models by Replacing Homegrown Licensing with Gemalto Sentinel

Imagine a software technology that could automatically identify individuals that pose a threat to safety and security – by scanning crowds of people on the streets, or in places like airports, stadiums, or train stations. Imagine a marketing world where…

False Positives: The Cure is Worse than the Disease

Introduction Even after implementing SOAR, SIEM, IDPS, and other solutions to obtain better security insights, SOC teams are often overwhelmed by the high volume of low-fidelity alerts generated by their security controls. This paper discusses the causes of the continued…

Charting Your Path to Enterprise Key Management

Executive Summary The increasingly prevalent use of data protection mechanisms in today’s enterprises has posed significant implications. One of the most profound challenges relates to key management, and its associated complexity and cost. Written for business leadership and security architects,…

2x Your B2B Marketing ROI with Chain-Based Attribution

Marketing ROI. For most marketers — this is the holy grail — knowing exactly where to spend our next dollar to get the largest impact and return. I can’t tell you how many times I’ve heard from our investors and…

PRIORITIZATION TO PREDICTION

This research was commissioned by Kenna Security. Kenna collected and provided the remediation dataset to the Cyentia Institute for independent analysis and drafting of this report. Kenna Security is a leader in predictive cyber risk. The Kenna Security Platform enables…

Automating Incident Response

Security operations present an escalating series of management challenges. As the frequency and variety of attacks accelerate, even the best teams can get overwhelmed with alerts. The sheer volume of potential threats often present teams with the false dilemma of…

How to Win the Cybersecurity Talent Race

Data production, collection, usage, and storage are part of daily life for consumers and organizations engaged in the modern digital environment. All stakeholders involved in this cycle share a similar goal: keep data, and particularly personal data, private and secure….

18 Commonly Overlooked Offboarding Steps

There is more to offboarding than many people—even those within IT—often realize. To most, offboarding means deprovisioning an exiting employee from apps. Shut off their access, collect their keycard and laptop, and call it a day. That’s just the tip…

THE ESSENTIAL GUIDE TO RISK-BASED VULNERABILITY ORCHESTRATION ACROSS THE SOFTWARE LIFECYCLE

Today, software sits at the heart of everything a company must do to stay current and competitive in their quest for digital transformation. This notion was first identified by entrepreneur, investor and software engineer, Marc Andreessen, whose famous article in…