Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

What Is Email Security? And What Are Best Practices?

Email security refers to various cybersecurity measures to secure the access and content of an email account or service. Proper email security can protect sensitive information in email communications, prevent phishing attacks, spear phishing and email spoofing and protect against unauthorized access, loss or compromise of one or more email addresses.

Assessment Frameworks for NIS Directive Compliance

According to the NIS Directive, Member States should adopt a common set of baseline security requirements to ensure a minimum level of harmonized security measures across EU and enhance the overall level of security of operators providing essential services (OES) and digital service providers (DSP).

Why Asset Visibility Is Essential to the Security of Your Industrial Environment

Threats against industrial environments are on the rise. Near the beginning of 2019, for example, Kaspersky Lab revealed that 47% of industrial control system (ICS) computers on which its software was installed suffered a malware infection in the past year. That was three percent higher than the previous year.

Banking on ATM Big Data: How to use real-time transaction data to make your operations lean and customers keen

While the ATM channel remains a strategic part of a healthy omni-channel banking ecosystem, it is continuously under critical analysis within many financial institutions. The big challenge lies in maintaining ATM fleets as a profitable delivery channel.

Why a Multi-Layered Technology Approach is the Best Choice for Preventing ATM Cash-outs and Cybersecurity Attacks

Despite several recent high-profile attacks, ATM cash-out schemes that involve multiple attack vectors over a very large attack surface continue to happen. While traditional fraud system management tools will provide one layer of defense against cash-out attacks, common single point monitoring solutions still run a risk of being compromised.

A new twist on "Parental consent"

I was at breakfast the other day with some family friends, and the topic of genealogy came up. Over the past few years, various sites have sprouted up that offer to trace your origins all the way back in time; in some cases, all the way back to the eras of early human development. One of my favorite authors has actually written a book about the results of his test. The idea behind the test is simple.