CYBER THURSDAY: Stop Fraud Without Friction: How to Stay Ahead of Motivated Attackers

About: Competing for customer loyalty in a digital world is hard. To add to this challenge, leaders must defend the business from motivated adversaries who have evolved their tactics to bypass security defenses and evade detection. Any business that operates eCommerce applications or manages user accounts of value is a potential target and the consequences…

Read More

CYBER THURSDAY: Manage and Mitigate Risks With Information Security Capability Prioritization

About: Reporting information security risk to the business is an effective way to gain buy-in from leadership and helps with informed decision-making and prioritization. The challenge is finding a repeatable methodology for visualizing information security maturity in an easy to consume, measured, and defendable manner. At Enterprise Holdings, Inc. (EHI), Kevin McQuade was tasked with…

Read More

CYBER THURSDAY: Staycations for Cybercriminals: How Hackers Are Exploiting the Shift Toward Online Retail and Hospitality Services

About: The retail and hospitality sectors face a steady stream of emerging and innovative cyberattacks that challenge security teams and stretch organizations thin as they attempt to plug holes. Businesses in this industry harbor massive databases of sensitive information, which places a glaring target on their backs and entices cybercriminals. As the COVID-19 pandemic continues…

Read More

CYBER THURSDAY: Prepare for eCommerce Threats in the New Year

About: In 2020, we saw a huge shift in consumer behavior. Online shopping has quickly become the new normal for retailers to engage and keep customers. While malicious online threats have been on the rise, experts predict we haven’t seen the worst of it and that these threats are not only something we should expect,…

Read More

CYBER THURSDAY: Improve Your Detection Process with Attack Range

About: Analysts are constantly looking for ways to work smarter, not harder. Take the guesswork out of understanding threats and improve your security defenses, all with one powerful solution. In this upcoming webinar, analysts will walk away with knowledge on how to use MITRE ATT&CK and Attack Range to simulate attacks, validate detections, and generate…

Read More