JPMorgan Chase is investigating whether some of its employees may have enabled misuse of the federal government's Paycheck Protection Program, which provided small business loans during the COVID-19 pandemic, Bloomberg reports.
A hybrid workforce, heightened insider risk, 5G concerns over the expanded attack surface - these are the "more" that people reference when they talk about "doing more with less" in 2021. A CEO/CISO panel discusses how security leaders prioritize budget allocations for these concerns.
A former Cisco engineer has pleaded guilty to causing $1.4 million in damages to his former employer. Sudhish Kasaba Ramesh admitted to deleting 456 virtual machines that affected 16,000 WebEx accounts for weeks, according to the Justice Department.
News that a malware-wielding gang of Russians targeted Tesla by attempting to work with an insider should have all organizations asking: What would happen if extortionists attempted to bribe one of our employees to install malicious code designed to steal corporate secrets for ransom?
Tesla CEO Elon Musk says a "serious attack" aimed at stealing corporate data and holding his company to ransom has been thwarted. The FBI has accused a Russian national of attempting to recruit an insider to install malware to steal data, which criminals hoped to ransom for $4 million.
The unprecedented level of cybersecurity risk today extends far beyond the four walls of the enterprise. There is no longer any difference between personal and corporate protection when it comes to members of the executive team and board. High-level individuals now have a single, unified digital life, and senior...
The emerging cloud-delivered service model known as security access service edge, or SASE, is designed to help simplify security for remote access, says Sean Duca of Palo Alto Networks, who explains how the model works.
Organizations across the country are closing their offices and opening their laptops to provide services to millions of Americans who are under guidance to stay home. With the increase in remote work has come a surge of cyberattacks on all critical resources such as state and local governments, healthcare facilities,...
Download this report to find out how: A single-site proof-of-concept quickly led to a full roll-out across 36 power stations; trust power gained visibility and dramatically improved their security posture and the rugged solution empowered the company to monitor its operational environments.
Last year, 81 percent of organizations experienced one or more successful cyber attacks. That's just one revelation in the 2020 Cyberthreat Defense Report that will make you reevaluate your security posture. Discover which technologies teams use to adopt a Zero Trust architecture and why security analytics tools are...
Russia, China and Iran are all seeking to influence the 2020 U.S. Presidential election in November, according to a new report from the Office of the Director of National Intelligence that offers details about each country's plans and goals.
Download this eBook to find out how to start tackling an insider risk management problem. In this eBook, insider threat expert and CEO Shawn M. Thompson, Esq. draws on the Insider Threat Management Group's experience training and building insider threat programs for over 500 companies, to:
Explore insider threat...
Following Twitter's admission that cryptocurrency scammers socially engineered its employees to gain control of 45 high-profile accounts, one reaction has been: Why didn't anyone crack Twitter sooner? Unfortunately, the answer is that they have, especially if you count nation-states bribing insiders.
Twitter says attackers who hijacked more than 130 high-profile Twitter accounts used social engineering to bypass its defenses, including two-factor authentication on accounts. Experts say companies must have defenses in place against such schemes, which have long been employed by fraudsters.
As companies lay off employees and deal with financial challenges during the COVID-19 pandemic, they're also facing an increase in the number of insider fraud incidents, says Randy Trzeciak, director of the National Insider Threat Center at Carnegie Mellon University, who offers fraud detection tips.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing fraudtoday.io, you agree to our use of cookies.