behavioral analytics
Here’s how NuData helped one bank improve user experience without compromising security
Does effective security have to come at the cost of user experience? Here’s how behavioral biometrics improves both. The post Here’s how NuData helped one bank improve user experience without compromising security ...
3 key takeaways from our Consumer and Risk Report
How can businesses improve cybersecurity efforts in 2022? By understanding the tactics fraudsters use most. The post 3 key takeaways from our Consumer and Risk Report appeared first on NuData Security ...
How much do fraudsters invest to take down your company?
Over our past few blogs, we’ve explored how device intelligence and behavioral analytics stop fraud in its tracks. But what type of fraud are we talking about, exactly? The post How much ...
If You Prevent Ransomware You Don’t Need to Recover from It
I started Cybereason to help defenders protect their networks and data against attacks—to use what I know about how cybercriminals think and how adversaries work to give defenders an advantage against all ...
Analyst Report: How to Prepare for Ransomware Attacks
Ransomware operations have evolved dramatically in recent months and years, and now leverage advanced tactics to infiltrate an organization. Security and risk management leaders need to look beyond just the endpoints to ...
Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand
The Sodinokibi/REvil ransomware gang has reportedly infected Taiwanese multinational electronics corporation Acer and demanded a ransom of $50 million. Those responsible for the Sodinokibi ransomware strain announced on their data leaks website ...
Using Behavioral Analytics to Fight Ransomware
The recent attacks on the City of Baltimore and the Norsk Hydro energy facility in Norway are among the latest incidents that show that ransomware, a part of a larger range of ...
Consumer IoT Security v1.01
They say charity begins at home, well IoT security probably should too. The growing number of Internet enabled and connected devices we populate our homes with continues to grow year on year ...
Deception Technologies: Deceiving the Attacker or the Buyer?
Deception technologies, over the last three-ish years, have come into vogue; with more than a dozen commercial vendors and close to a hundred open source products available to choose from. Solutions range ...