Credential Harvesting

Numerous attack campaigns in the past couple of months have demonstrated a common tactic used by cybercriminals and state-sponsored attackers alike―credential harvesting. According to the Verizon 2017 Data Breach Investigation Report, 81% of hacking-related breaches leverage either stolen, default or weak credentials. While credential harvesting is often seen as equivalent to phishing, it uses different…

Read More

New Authentication Standards Help Merchants Reduce Risk and Checkout Friction 

By Brett McDowell, Executive Director, The FIDO Alliance With attacks shifting away from POS terminals to web and mobile channels, the risk of data breach and account fraud for online retailers is skyrocketing, but new global standards developed jointly by the FIDO Alliance and the W3C are being implemented by leading web browsers and consumer…

Read More

Third Party Vendor Risks

The threat landscape has transformed significantly over the last decade. As organizations have invested in security controls, tools and personnel to combat threats, threat actors have found other ways to infect systems and ultimately compromise organizations. As a result, threat actor groups have begun to target third-party vendors. Organizations rely heavily on their third-party vendors…

Read More