BankInfoSecurity.com
Fraud to Compliance: How Banks Use AI for Resilient Security
4 months ago
Financial Institutions Break Down Silos to Combat Faster, AI-Powered Threats
Banks face AI-powered fraud attacks and stricter compliance demands. Unified platforms that integrate security, fraud detection and compliance help institutions respond faster while empowering human analysts to focus on strategic decisions.
Banks face AI-powered fraud attacks and stricter compliance demands. Unified platforms that integrate security, fraud detection and compliance help institutions respond faster while empowering human analysts to focus on strategic decisions.
Voluntarily Retirement Keeps Eluding Ransomware Attackers
4 months ago
What's Left After Raking In Millions From Other People's Blood, Sweat and Tears?
Things that continue to elude scientific observation: the Loch Ness Monster, Bigfoot and the ransomware hacker who voluntarily chose retirement. "There's no such thing as 'retirement' in cybercrime," despite some ransomware hackers dangling promises to leave the field.
Things that continue to elude scientific observation: the Loch Ness Monster, Bigfoot and the ransomware hacker who voluntarily chose retirement. "There's no such thing as 'retirement' in cybercrime," despite some ransomware hackers dangling promises to leave the field.
Career Spotlight: White Hat Hackers in an Automated World
4 months ago
Pentesting Tools Uncover Vulnerabilities but White Hat Skills Are Still in Demand
Automated pentesting tools offer faster visibility and robust integration with daily security operations, but automation doesn't eliminate the need for humans in the loop. Automation raises the baseline for vulnerability management and changes what white hat hackers need to know to stay relevant.
Automated pentesting tools offer faster visibility and robust integration with daily security operations, but automation doesn't eliminate the need for humans in the loop. Automation raises the baseline for vulnerability management and changes what white hat hackers need to know to stay relevant.
Tool Evaluation Skills: A Cure for Shiny Object Syndrome
4 months ago
Evaluating Tools Saves Money But Requires Technical, Compliance and Business Acumen
Shiny object syndrome is more than a metaphor in cybersecurity. Organizations that chase every new tool often discover that what looked impressive in a demo fails to meet operational needs. The cure for this common malady is a structured tool evaluation process.
Shiny object syndrome is more than a metaphor in cybersecurity. Organizations that chase every new tool often discover that what looked impressive in a demo fails to meet operational needs. The cure for this common malady is a structured tool evaluation process.
How OT Device Flaws Can Threaten Hospital Operations
4 months ago
Recent advisories from U.S. federal authorities on vulnerabilities in certain operational technology devices underscore the potential security risks that many healthcare providers frequently underestimate, said Sila Özeren, a security research engineer at Picus Security.
Study Finds 1.2M Medical Devices Exposed on Internet
4 months ago
Default credentials, weak passwords, misconfigurations and a variety of other security shortcomings are exposing millions of medical devices and their data on the internet, said Soufian El Yadmani, CEO and co-founder of Modat, who shared recent research findings.
New Texas Law Targets AI, Health Record Storage
4 months ago
New Texas health information legislation that began to go into effect on Sept. 1 includes several noteworthy provisions including requirements related to health record data storage and artificial intelligence, said regulatory attorney Rachel Rose. Rose explains the significance of the new state law.
NASA, Google Testing AI 'Doctor in a Box' for Space Missions
4 months ago
A new AI-powered clinical decision support system developed by Google and NASA aims to help astronauts diagnose and treat medical issues during space missions - even when real-time communication with Earth is unavailable, said Chris Hein, field CTO of Google Public Sector.
The Browser Is Now the Workplace: How Your Organization Could Be Exposed
4 months ago
Webinar | Unlock the Strategic Value of Cyber Threat Intelligence (CTI) to Reduce Enterprise Risk
4 months ago
Attackers No Longer Break In: AI Simply Lets Them Assume Your Identity
4 months ago
Ransomware Recovery Hands-On Lab: Real-World Challenges
4 months ago
Android Spyware Targets UAE Messaging Users
4 months ago
Fake Messaging Apps Use Previously Undocumented Malware
Android spyware campaigns using previously undocumented spyware masquerade as upgrades or plugins for secure messaging apps Signal and ToTok, warn researchers. The two campaigns appear to target residents of the United Arab Emirates.
Android spyware campaigns using previously undocumented spyware masquerade as upgrades or plugins for secure messaging apps Signal and ToTok, warn researchers. The two campaigns appear to target residents of the United Arab Emirates.
New Open Systems CEO Bets on Service to Win in SASE Market
4 months ago
New CEO Dennis Monner Outlines Open Systems' Global Expansion, SASE Differentiation
New CEO Dennis Monner said Open Systems stands out by combining SASE technology with 24/7 expert-led service. Backed by Swiss Post, the company aims to capture more enterprise customers in Europe and the U.S. who seek a trusted alternative to U.S. and Israeli vendors.
New CEO Dennis Monner said Open Systems stands out by combining SASE technology with 24/7 expert-led service. Backed by Swiss Post, the company aims to capture more enterprise customers in Europe and the U.S. who seek a trusted alternative to U.S. and Israeli vendors.
UK Home Office Seeks Apple Backdoor Access
4 months ago
New Investigatory Powers Act Request Reportedly Transmitted in September
The U.K. Home Office reportedly again ordered Apple to give it backdoor access to an encrypted cloud service after backing down in August from a similar demand made earlier this year. The order comes after a similar attempt by the Home Office in January.
The U.K. Home Office reportedly again ordered Apple to give it backdoor access to an encrypted cloud service after backing down in August from a similar demand made earlier this year. The order comes after a similar attempt by the Home Office in January.
ISMG Editors: US Federal Government Shutdown Fallout
4 months ago
Also: the UK's $7B Bitcoin Case, Implications of Vectra's Netography
In this week's update, ISMG editors examine how the U.S. shutdown and the lapse of CISA 2015 liability shield are straining cyber operations, what Vectra’s move for Netography signals for multi-cloud visibility and NDR, and how British prosecutors unraveled a bitcoin hoard now worth $7 billion.
In this week's update, ISMG editors examine how the U.S. shutdown and the lapse of CISA 2015 liability shield are straining cyber operations, what Vectra’s move for Netography signals for multi-cloud visibility and NDR, and how British prosecutors unraveled a bitcoin hoard now worth $7 billion.
OnDemand | 2025 State of the SOC Report: The Impact of AI on SOC Services
8 months 1 week ago
CISA's New SIEM Guidance Tackles Visibility and Blind Spots
8 months 1 week ago
US, Australian Cyber Agencies Say Visibility Gaps Threaten Detection and Response
The Cybersecurity and Infrastructure Security Agency issued new guidance urging organizations to streamline Security Information and Event Management platform integration by prioritizing impactful log data and reducing blind spots that continue to plague even mature security operations centers.
The Cybersecurity and Infrastructure Security Agency issued new guidance urging organizations to streamline Security Information and Event Management platform integration by prioritizing impactful log data and reducing blind spots that continue to plague even mature security operations centers.
Tenable Bolsters AI Controls With Apex Security Acquisition
8 months 1 week ago
Apex Security Detection Tools Help Tenable Spot Accidental and Malicious AI Misuse
Tenable is acquiring Israeli startup Apex Security to extend AI security features that go beyond asset discovery. With user-level controls and risk mitigation for AI usage, Tenable aims to accelerate its exposure management roadmap by integrating Apex into Tenable One later this year.
Tenable is acquiring Israeli startup Apex Security to extend AI security features that go beyond asset discovery. With user-level controls and risk mitigation for AI usage, Tenable aims to accelerate its exposure management roadmap by integrating Apex into Tenable One later this year.
Checked
9 hours 55 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed