Top 5 Cybersecurity Predictions for 2022

The last few years have been challenging for cybersecurity departments who were forced to adapt quickly to rapid digitalization in the face of the COVID-19 pandemic. An expanded attack surface has presented new opportunities for cyber criminals, but developing technology holds possibilities for more efficient protection. Here are just a few of the cybersecurity predictions…

Read More

Member Spotlight: Tae Kim

This month’s member spotlight, Tae Kim of Albertsons Companies, has an impressive resume of cybersecurity experience, despite not starting his career in the cybersecurity field. In 2006, Tae was working for the United States government when he was asked to be a senior cyber intelligence analyst. Prior to this, he had been primarily involved in…

Read More

What are Double and Triple Extortion Ransomware Attacks

The last few years have seen a dramatic rise in high-profile ransomware cases, leading CISOs to bump ransomware planning to the top of their list of initiatives. However, just as companies have adapted to guard against this threat, ransomware gangs have adapted in turn, employing additional layers of extortion focused on exposing customer data. A…

Read More

Analyzing the Cybersecurity Hygiene of Ransomware Victims

Any company operating a modern information technology environment can fall victim to system-encrypting ransomware. But not every company has fallen victim. Do companies that experience an operations-impacting ransomware event have poor cybersecurity hygiene? Or is the quality of cybersecurity hygiene not a factor in the frequency of ransomware events? To answer these questions, RiskRecon analyzed…

Read More

Balancing Act: Tackling the Top E-Commerce Fraud Challenges

The surge in online activity in recent years has led to a corresponding explosion in online fraud – a 140% increase in the volume of fraud attacks in 2021 compared to pre-COVID. Even enterprises with strong fraud prevention programs now struggle to confidently distinguish real consumers from cybercriminals. Confidence in the customer-vs-criminal question and the…

Read More