Back to Search Begin New Search Save Search Auto-Notify
The Power of Voice to Prevent Fraud
Nuance security and biometrics solutions enable easy and secure authentication by identifying a person based on their human traits; like their voice, fingerprints, face or even how they use their devices. The importance of security cannot be understated. Today's businesses rely on working with known customers in a friction-free environment. To get to that level of customer service, organizations need to be confident that their customer is who...
Add Favorite
Collaboration and Zero Trust in a Volat...
Now more than ever, there’s a need for a flexible, future-state identity service that enables a fast and secure shift to support a remote and collaborative workforce outside the network. Federal employees need to work with contractors from home. Citizens need to engage via digital means rather than in person. Constituents not only require access to mission-critical tools they were already using but the pandemic has highlighted the need t...
Add Favorite
Mitigating Business Email Compromise an...
Email fraud leads to two main threats - one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers become you. BEC/EAC scams have cost the victimized organizations over $26 billion since 2016. What they have in common is that they both target people.They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Fraud Beyond the Pandemic: The Role of...
Public sector agencies’ digital strategies were put to the test by the pandemic. With legacy and manual systems pushed to their limits by the new digital age, agency leaders were faced with the unprecedented task of scaling digital solutions which suddenly became the default channel for millions of interactions with the population. Public sector professionals stepped up to the challenge. However, as the effects of the pandemic ease, indi...
Add Favorite
The U.S. Securities and Exchange Commis...
The U.S. Securities & Exchange Commission recently proposed rules to strengthen the ability of public companies, funds, and advisors to combat cybersecurity threats and implement risk mitigation processes. SecurityScorecard was joined by Kristy Littman, U.S. Securities and Exchange Commission Chief of the Crypto Assets and Cyber Unit, Michael Daniel, President & CEO of the Cyber Threat Alliance and Friso van der Oord, Senior Vice Presi...
Add Favorite
Hands-on Lab Series Part 2: Introductio...
View this on-demand session on conducting end-to-end analysis. To start off, we unpacked how Federal, State, and Local agencies are utilizing data-driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. During this on-demand webinar, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data qu...
Add Favorite
Malice, Misuse, & Mistakes: How Organiz...
View this on-demand webinar with Privileged Access Management (PAM) experts from Saviynt as they share best practices and anecdotes from their 20 years of experience in the PAM space. They also demonstrate how Saviynt’s Cloud PAM solution can help mitigate the risks of mistakes, misuse, and malice with just-in-time, seamless, identity-driven privileged access management. During this on-demand webinar, you'll have the opportunity to find...
Add Favorite
Tap into DHS Cyber Grants Funding to St...
The Biden Administration recently issued a statement warning of potential cyberattacks against U.S. organizations, as tensions rise between Russia and the rest of the world. Potential attacks to state and local critical infrastructure would disrupt the lives of millions of Americans, affecting lifeline services such as power, water, healthcare services, and supply chains. State, tribal and municipal government organizations need clear visibili...
Add Favorite
Back to Search Begin New Search