Mitigating Bot Attacks and Reducing User Friction: Modern Security Can Produce Win-Win Situations

In today’s digital ecosystem, users are accustomed to getting what they want—and getting it fast. Our phones unlock themselves at a glance, our laptops unlock with a swipe of our finger across a scanner, our laptops unlock because they recognize the presence of our pin-secured watch on our wrists. Research has shown that this kind…

Read More

We Are Not Alone: Regional Intelligence Workshop Series Recap

RH-ISAC wrapped up the last of five Regional Intelligence Workshops in July. These workshops, sponsored by SpyCloud, were all sold out and brought together security practitioners from various regions across the U.S. to discuss topics relevant to their local security community. Initially, we planned for in-person workshops, but we quickly moved to fully virtual programs to ensure the safety of all participants. As we navigated through murky waters brought on by…

Read More

Modern Solutions for Mitigating Fraud in a Shifting Economic Climate

Prior to the COVID-19 pandemic, 63% of consumers said they referenced their mobile phones as a resource while shopping in stores1. Today, due to the lack of face-to-face interactions resulting from COVID-19, we’re seeing a rapidly accelerated adoption of eCommerce as a marketplace. The week following the pandemic declaration, eCommerce traffic increased 23% and it’s…

Read More

Discussing the PCI Software Security Framework: What Merchants Need to Know

Payment acceptance begins with confidence in the security of transmitting data.  As technology advances and new platforms emerge, the security of the software that supports those transactions becomes increasingly critical to safeguarding payment information. Modern software development requires objective-focused security to support more nimble development and update cycles than traditional software development practices. This issue…

Read More

Top 5 Tips to Protect User Data

If there’s one thing that never changes in cybersecurity, it’s this: threat actors will always look for the path of least resistance to gain access to a victim’s network. While companies that collect and maintain personally identifiable information (PII) or protected health information (PHI) are often the preferred targets of threat actors, attackers will target…

Read More