Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bots

Does bot management strengthen customer loyalty and engagement?

Organizations can create a level of greater trust between digital businesses and their customers by using sophisticated bot management solutions, as we understand from a recent Gartner ® report. ‘Don’t Treat Your Customer Like a Criminal’, by Gartner analysts Tricia Phillips, Jonathan Care and Akif Khan, is available for a complimentary download from the Netacea website until 31st July 2022.

Uncovering the dark web: What is it and who uses it?

The dark web is the seedy underbelly of the internet. Unlike the surface web, criminals, spies, freedom fighters, and hacktivists can operate anonymously on the dark web, making it a popular place for illicit activity. Legitimate internet users also use it to protect their privacy in a world where people are increasingly mistrustful of digital giants like Google and Facebook. But it’s very easy to accidentally view illegal, dangerous, and traumatizing material on the dark web.

RSA Conference 2022: Netacea's highlights

Last week Netacea team members from the UK and across the US converged at RSA Conference, the biggest event in the cybersecurity calendar, at the Moscone Center in San Francisco. It was a pleasure to talk to so many likeminded security professionals at our booth, and an honor to be given a speaking session from which to spread the word about automated threats.

Cybersecurity Sessions #8: MFA is better than passwords... Right?

We’re told that multi-factor authentication is more secure than passwords, but in truth most MFA is susceptible to the same old threats, such as phishing and man-in-the-middle attacks. In fact, the widely championed advice to “use MFA, any MFA” could lead to a false sense of security and even more data breaches.

MFA is better than passwords... Right? | Cybersecurity Sessions #8 with Roger Grimes

We’re told that multi-factor authentication is more secure than passwords, but in truth most MFA is susceptible to the same old threats, such as phishing and man-in-the-middle attacks. In fact, the widely championed advice to “use MFA, any MFA” could lead to a false sense of security and even more data breaches. In this episode, Andy sits down with Roger Grimes (Data-Driven Defense Evangelist, KnowBe4) to find out why MFA is vulnerable to exploitation, whether some MFAs are better than others, and what the future of secure authentication might look like.

Interactive Phishing: Using Chatbot-like Web Applications to Harvest Information

Phishing website links are commonly delivered via email to their respective targets. Once clicked, these websites often show a single webpage that outright asks for sensitive information like account login credentials, credit card details, and other personally identifiable information (PII). Recently, we have encountered an interesting phishing website containing an interactive component in it: a chatbot.

AI in Cybersecurity - A Double-Edged Sword | Cybersecurity Sessions #7 with Elaine K. Lee

It’s likely that we encounter artificial intelligence more often than we realize. Just as AI can be used to facilitate fraud and spread misinformation via deepfakes and sophisticated identity theft, it can also be used to develop algorithms that detect cyber-attacks in the blink of an eye. In this episode of the Cybersecurity Sessions, Andy is joined by Elaine Lee (Data Scientist, Mimecast) to delve into the benefits and risks of AI in cybersecurity, examining how artificial intelligence can be used both as an offensive weapon by adversaries and by security teams to defend against attacks.