Subscribe to RSS Feed grab our rss feed

Entries Tagged ‘online security’

Verint Speakers: Engaging Customers, Tackling Cyber Challenges, and Using Data to Improve Experiences

Customer Response Summit February 6-8; Las Vegas, Nevada Verint’s Greg Sherry, vice president, marketing, will lead an interactive general session with conference executives called “Customer Engagement LIVE!” at 2:30 p.m. PT on February 7.  Discussions will include how customer-centric organizations can enrich interactions, improve business processes, and optimize the workforce. Participants will meet and exchange ideas […]

read more...

Webcast: What to Look for in an Effective Cyber Detection & Response Solution

Despite our best efforts, cyber attacks are getting more aggressive and sophisticated. The threat of targeted attacks is real, and the cyber security landscape must change with the need for greater vigilance. Today leading analysts are encouraging organizations to deploy solutions that go beyond the traditional defenses of siloed products, such as firewalls and antivirus […]

read more...

Detecting Command & Control Communications—Context Is Key

By now, the concept of the cyber attack chain—or kill chain—is widely accepted as a way to understand and deal with threats. The first thing that malware does once it’s established on the network is call home—reach out to a Command and Control (C&C) server. C&Cs are famous for controlling botnets, but they are essential […]

read more...

Revealing the Long-Term Costs of Building an Advanced Cyber SOC

Aware of the dangers and probability of suffering a data breach, organizations are rethinking their security posture. They realize that the traditional prevention-based security model, based on signature-based perimeter tools, is no longer effective against advanced cyber threats. To avoid being the next victim of a high-profile data breach, organizations are seeking advanced and post-breach […]

read more...

Hats Off to Customer Personas—Optimizing Digital First Strategies

One of the keys to optimizing government digital transformation strategies is being able to identify individuals online so they can access services conveniently and securely. In my blog, Deliver More Economic Benefits by Getting Secure Online Transactions Right, I pointed out that although not all digital services require people to be authenticated via an online […]

read more...

Align the Attack/Defense Mismatch Part 2: Address the Shortage of Cyber Skills and Resources

There has been a lot of discussion lately about the cyber skills shortage. No question our industry must do more to provide education about cyber security and to encourage more students to launch down this path. But in the meantime, there is much that can be done to help improve efficiency and alleviate the shortage […]

read more...

Stop Online Fraudsters in their Tracks with Voice Biometrics

Did you know contact centers are becoming an increasing part of the online fraud life cycle? Since the rollout of “chip-and-pin” cards, fraudsters are devoting more time to online card not present (CNP) attacks. This includes exploiting the contact center for access to account information. However, there is a promising new defense against this increased […]

read more...

Align the Attack/Defense Mismatch Part 1: Make Security Teams More Productive

Despite the fact that companies invest $92 billion annually on cyber security, 80% of organizations are still breached. Just recently, highly publicized breaches at Acer, Cisco’s GotoMyPC, and Calgary University suggest that on the whole, our approach to cyber defense is fundamentally flawed. And the worst part is—today’s sophisticated attackers know exactly what these flaws […]

read more...

How Vulnerable is Your Brand?

Terms such as ATM skimming, identity theft, data breaches, scams, kiting, and phishing are becoming all too prevalent in today’s society. In just the last five years we’ve seen large, well-known retail and financial services organizations attacked by hackers and other nefarious individuals looking to steal personal information, transactional data or even funds from those […]

read more...

Putting the Banking Customer in Control

Appointments are really the norm in most businesses today. From Apple® stores1 to urgent care facilities, people are no longer willing to wait several minutes—or even an hour—for service. Customers expect to be able to select the most convenient day, time and location to get the service they desire. They want to be in control. […]

read more...