AI for fraud detection to triple by 2021
Advanced analytics and biometrics fast becoming central to anti-fraud programmes, according to a new global survey
Advanced analytics and biometrics fast becoming central to anti-fraud programmes, according to a new global survey
With cybercrime increasing in size, complexity and cost, firms need to take a fresh perspective on leading through this challenging environment, writes Justin Gray of Accenture NZ.
“We’re calling on the New Zealand Government to follow the example of the Australian Taxation Office,” says MYOB country manager Ingrid Cronin-Knight
When it becomes law, Australia will be one of the first nations to impose broad access requirements on technology firms, after many years of lobbying by intelligence and law enforcement agencies in many countries, particularly the so-called Five Eyes nations
The real question is, could the intrusion have been detected earlier?
It's no secret that U.S. government agencies and businesses are the target of around-the-clock cyber intrusions, many carried out by or at the behest of foreign nation-states.
Issues like cybersecurity might keep CIOs up at night, but in Northern New Jersey, at least they know they're not alone.
Last week, U.S. Marshals sold off another 50,000 Bitcoins that used to belong to Silk Road founder Ross Ulbricht -- a.k.a. "Dream Pirate Roberts." Ulbricht was found guilty on all accounts last month, and faces up to life in prison.
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.
Imperva's Amichai Shulman looks at database attack and defense.
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected. BEC uses emails from fraudsters posing as an executive. They ask the victim to wire money or disclose sensitive information. Only later do the victims realize that the email didn’t come from the executive.