Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bots

Break the account takeover kill chain with better password encryption

The new currency in the digital age is personally identifiable information (PII). Information about who we are, what we like, how we act, where we go and why we do things is a valuable resource which organizations use to sell to us more effectively. Users rightly expect businesses to take proper care of this information, because in the wrong hands, it can be used to harm the user.

How to improve user experience without compromising security

In a fiercely competitive industry, user experience (UX) is one area where retailers can differentiate themselves and win customer loyalty. UX design is a means to reducing friction between users and what they want to do (or more accurately, what the business wants them to do). UX is thus vital to influencing metrics like conversion rate, time on site, page views and basket size.

Underground Forums: Tactics used by cybercriminals to restrict access

Data breaches are increasing in frequency and severity. Following a data breach, most companies have protocols in place to contain the breach, assess the damage, and tighten their security to ensure the incident is not repeated. While this is a standard process for organizations to go through, would you be surprised to learn that cybercriminals do the exact same thing when their underground forums are revealed or exploited?

A battle or a coalition? Proactive vs reactive cybersecurity

Many businesses are starting to investigate proactive vs reactive cybersecurity methods. Reactive cybersecurity strategies have been effective in the past when dealing with incidents and remain relatively effective where known threats are concerned. The problem is that cyber criminals are now aware that businesses are already prepared for known threats and are actively improving and evolving their cyber-attack methods to evade detection.

Humans can never be as quick or as intelligent as bots when it comes to identifying threats

Originally posted on CyberNews. As more businesses race to shift their operations online, new website owners have to adapt to a new way of doing business and deal with a variety of online threats. While most of us think of disrupted websites or servers going offline when we hear the words “bot attack,” the reality is often different.

Cybersecurity Sessions recap: Artificial Engagement and Ad Fraud

In a recent episode of the Cybersecurity Sessions podcast, Netacea CTO Andy Still quizzed Beacon CTO Stewart Boutcher about ‘artificial engagement’, a term Stewart has championed as a member of the Data and Marketing Association North Council. Artificial engagement refers to fake clicks and impressions generated by bots on ad networks, costing marketeers huge chunks of their digital advertising budgets.

Artificial Engagement & Ad Fraud | Cybersecurity Sessions #4

In this month’s episode, we’re talking about ad fraud and the role bots play in this lucrative space. Marketers care intensely about engagement and pay advertisers good money to get it, but how do they know they aren’t paying for visits from malicious bots? And what other kinds of harm do ad fraud bots cause businesses as a result? To find out, Andy invites Beacon’s Stewart Boutcher onto the Cybersecurity Sessions. As two CTOs focused on tackling bots, but from different perspectives, Andy and Stewart find plenty to discuss!

How to create a strong cybersecurity culture in your organization

The cybersecurity culture of an organization encompasses the knowledge, awareness, attitudes and behaviors of employees regarding the threat landscape, cybersecurity and information technologies. Strong cybersecurity culture starts with building awareness and encouraging best practice cyber-hygiene, normalizing these behaviors so they become second nature to your team.

Why Zero Trust is the future of corporate cybersecurity

In a world driven by digital business, enterprise security needs to be continuously monitored and improved to keep up with evolving cyber-threats and to ensure data protection across the web. As the corporate, office-based workforce evolves to become more permanently remote, increased access control to business assets is needed for those both within and outside of the company network.