BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

SWIFT Announces Fraud Pattern Detection Controls

SWIFT Announces Fraud Pattern Detection Controls
Anti-Fraud , Fraud , Risk Management 'Daily Validation Reports' Will Provide Out-of-Band View of Messages Mathew J. Schwartz ( euroinfosec ) • September 20, 2016     To help financial institutions...
Continue reading
  0 Comments
0 Comments

After Equation Group Dump, Cisco Finds New Zero-Day Flaw

After Equation Group Dump, Cisco Finds New Zero-Day Flaw
Network & Perimeter , Risk Management , Technology Active Attacks Target Numerous Products, Technology Giant Warns Jeremy Kirk ( jeremy_kirk ) • September 20, 2016     Photo: Diesmer Ponstein (Flickr/CC)...
Continue reading
  0 Comments
0 Comments

Could FBI Have Cracked Shooter's iPhone for Less Than $100?

Could FBI Have Cracked Shooter's iPhone for Less Than $100?
Forensics , Mobility , Technology Researcher Demonstrates Technique, Acknowledges It Could Have Destroyed Device's Data Jeremy Kirk ( jeremy_kirk ) • September 20, 2016     Sergei Skorobogatov demonstrates his "chip...
Continue reading
  0 Comments
0 Comments

Aligning Cyber Framework with Organization's Strategy, Goals

A report on a new self- assessment tool that's intended to show whether an enterprise's cyber-risk initiative aligns with its goals and strategy leads the latest edition of the ISMG Security...
Continue reading
  0 Comments
0 Comments

Helping Police Solve Cybercrimes

How qualified is law enforcement to investigate today's cybercrimes? While many big-city police departments have all the necessary skills, those in smaller markets often do not, according to a panel of...
Continue reading
  0 Comments
0 Comments

Why Is Ransomware So Successful?

Ransomware attacks are surging because attackers have perfected their techniques while enterprises in all sectors have failed to address critical security shortcomings, says Raimund Genes , CTO at Trend Micro. "It's...
Continue reading
  0 Comments
0 Comments

FBI to Ransomware Victims: Please Come Forward

FBI to Ransomware Victims: Please Come Forward
image
Anti-Malware , Encryption , Technology FBI to Ransomware Victims: Please Come Forward Bureau Says Reporting Crime Drives Intelligence, Disruption, Arrests Mathew J. Schwartz ( euroinfosec ) • September 19, 2016  ...
Continue reading
  0 Comments
0 Comments

Dropbox 'Hacks' Macs, Researcher Warns

Dropbox 'Hacks' Macs, Researcher Warns
image
Application Security , Risk Management , Technology Dropbox 'Hacks' Macs, Researcher Warns Dropbox Defends SQL Trick, Saying Desktop App Needs Broad Permissions Jeremy Kirk ( jeremy_kirk ) • September 19, 2016...
Continue reading
  0 Comments
0 Comments

Tesla Patches Cars Against Wi-Fi 'Braking' Attack

Tesla Patches Cars Against Wi-Fi 'Braking' Attack
Application Security , Cybersecurity , Risk Management Researchers' Hack Turned on Wipers, Opened Doors and Applied Brakes Jeremy Kirk ( jeremy_kirk ) • September 21, 2016     Photo: Maurizio Pesce...
Continue reading
  0 Comments
0 Comments

Ideas for Filling the Cybersecurity Skills Gap

Ideas for Filling the Cybersecurity Skills Gap
CISO , Education , Governance Testimony Given to Presidential Commission on Enhancing National Cybersecurity Eric Chabrow ( GovInfoSecurity ) • September 21, 2016     Commerce Secretary Penny Pritzker (Photo: Department...
Continue reading
  0 Comments
0 Comments

Fighting Back Against Malware Hiding in Your SSL Traffic

× Close Request to Republish Content Original link
Continue reading
  0 Comments
0 Comments

2016 Faces of Fraud: The Analytics Approach to Fraud Prevention

2016 Faces of Fraud: The Analytics Approach to Fraud Prevention
Clinic Reports Security Incident Involving HIE Access
India's Insurers Face New Security Mandates
Ideas for Filling the Cybersecurity Skills Gap
Tesla Patches Cars Against Wi-Fi 'Braking' Attack
Healthcare Insider Crime Cases Spotlight Challenges
After Equation Group Dump, Cisco Finds New Zero-Day Flaw
Could FBI Have Cracked Shooter's iPhone for Less Than $100?
SWIFT Announces Fraud Pattern Detection Controls
NIST Unveils a Cybersecurity Self-Assessment Tool
Cybersecurity , Fraud , Technology 2016 Faces of Fraud: The Analytics Approach to Fraud Prevention Presented by SAS     60 Minutes     How Has Enterprise Mobility Forever Changed the...
Continue reading
  0 Comments
0 Comments

Rumor Mill: Yahoo Breach Affected Hundreds of Millions

Rumor Mill: Yahoo Breach Affected Hundreds of Millions
Cybersecurity , Data Breach Rumor Mill: Yahoo Breach Affected Hundreds of Millions But Password Reuse and Other Breached Sites - Not Yahoo - Could Be Culprit Mathew J. Schwartz ( euroinfosec...
Continue reading
  0 Comments
0 Comments

Hey, Webcam User: Cover Up!

Hey, Webcam User: Cover Up!
Privacy , Risk Management Hey, Webcam User: Cover Up! Why Everyone Should Be Doing the 'Zuck and Cover' Mathew J. Schwartz ( euroinfosec ) • September 21, 2016     Photo...
Continue reading
  0 Comments
0 Comments

Dropbox 'Hacks' Macs, Developer Warns

Dropbox 'Hacks' Macs, Developer Warns
image
Application Security , Risk Management , Technology Dropbox 'Hacks' Macs, Developer Warns Dropbox Defends SQL Trick, Saying Desktop App Needs Broad Permissions Jeremy Kirk ( jeremy_kirk ) • September 19, 2016...
Continue reading
  0 Comments
0 Comments

Broadening the Scope of Mobile Security

Broadening the Scope of Mobile Security
image
Mobility , Risk Management New NIST Report Offers List of Risks to Address Eric Chabrow ( GovInfoSecurity ) • September 26, 2016     Most enterprises, when addressing mobile security ,...
Continue reading
  0 Comments
0 Comments

Massive Yahoo Data Breach Shatters Records

Massive Yahoo Data Breach Shatters Records
Between Cybercriminals and State Actors, Password War is Being Lost Jeremy Kirk ( jeremy_kirk ) • September 23, 2016     Source: Yahoo Yahoo's disclosure of one of the largest-ever data...
Continue reading
  0 Comments
0 Comments

Fencing an Imaginary Yard; How to Secure your IP with an Unidentifiable Network Perimeter

× Close Request to Republish Content Original link
Continue reading
  0 Comments
0 Comments

Yahoo's Mega Breach: Security Takeaways

Security expert Sean Sullivan says he's not surprised that the 2014 breach of Yahoo , which exposed at least 500 million account details, only recently came to light. That's because multiple...
Continue reading
  0 Comments
0 Comments

Typical Cost of a Data Breach: $200,000 or $7 Million?

What's the cost of a data breach to the typical enterprises: $200,000 or $7 million? In this latest edition of the ISMG Security Report, you'll hear an explanation why estimates from...
Continue reading
  0 Comments
0 Comments