Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

LTT Attack Targets Session Cookies to Push Crypto Scam

Crypto scams are skyrocketing: In 2022, the FBI tracked an 183% year-over-year increase, driving $2.57 billion in losses. Last week, the popular YouTube channel Linus Tech Tips (LTT for short) – and two associated channels – became the latest crypto scam victim and unsuspecting accomplice.

Bank Account Verification: The Benefits of Using Bank Account Verification APIs

When a consumer opens a bank account, the bank goes through a procedure called bank account verification. It enables all required checks to be made on the account user and the source of their income, successfully stopping illegal activities like money laundering and the financing of terrorism. In this post, we’ll examine how to validate a bank account and its owner, as well as the legal considerations that must be made while validating a client’s bank account.

The Ultimate Guide to SaaS User Onboarding

User onboarding, in particular for SaaS organisations, may raise the bar for your product. More sales may result straight from onboarding. So, encouraging new users to stay is essential. Additionally, the best way to build a community around your SaaS offering is through satisfied customers. These two factors are the precise reasons why the initial few client contacts must be successful.

Embracing Biometric Identity Verification: A Look at Belgium and Kuwait Telecoms

Belgium: The country’s telecom authority has given a telco in Belgium , which is the largest cable broadband service provider, permission to utilise facial biometrics for remote identity verification. According to the Belgian Institute for Postal Services and Telecommunications (BIPT), the telecom operator responded to an email with clarifications on how the implementation of biometrics fits within the nation’s electronic communications framework.

CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches

From the CISO perspective, identity security is one of the top security challenges, driven by the adversary’s increased use of stolen credentials to target and infiltrate organizations. The data bears this out: according to the CrowdStrike 2023 Global Threat Report, 80% of attacks use compromised identities, while advertisements for access broker services jumped 112% in 2022.

The Benefits and Risks of Using Government Databases for ID Verification in Fraud Prevention

In today’s digital world, identity theft and fraud have become increasingly common occurrences. It is no secret that fraudsters are getting more creative, making it more challenging for businesses and individuals to protect themselves. However, with the advent of technology, there are various ways to mitigate these risks, such as using government databases for ID verification.

Protect Passwords, Don't Just Manage Them: A Game Plan for CIOs and CISOs

When 921 password attacks occur per second, it’s time to treat everyday employees’ credentials like the true operational risk they are. Today’s attackers assign a level of value to employees’ passwords they once reserved for privileged users’ credentials. Why? Workers now have a shocking amount of access to sensitive resources. I’ll elaborate… but through the perspective of a chief information officer kept up at night by risks.

What Is Zero Trust and Why Is it So Important?

You’ve heard about it. A lot. But there are quite a few nuances when it comes to how Zero Trust security is defined and discussed. Is it a platform or a principle? It’s one of those terms that’s so widely cited that it has the tendency these days to elicit eye rolls within the cybersecurity industry and to be referred to as a buzzword by those sitting at the cool kids’ lunch table.

The Ultimate Guide to KYC in Crypto: Everything You Need to Know

The first step in Anti-Money Laundering (AML) due diligence is to Know Your Customer (KYC). A financial institution (FI) promptly implements KYC processes to identify and confirm a new customer’s identification. These procedures enable FIs to evaluate the risk profile of a customer based on that person’s propensity for financial crime. KYC is a procedure that cryptocurrency exchanges are required to follow.

EP 23 - From Delivering Mail to Delivering Zero Trust: A CSO's Cyber Journey

Today’s guest is Den Jones, who’s Chief Security Officer (CSO) at Banyan Security, a startup Zero Trust network access solution (and a CyberArk technology partner). Jones spent almost 19 years at Adobe, followed by a stop at Cisco, before landing at Banyan in 2021. As his Twitter bio tells it, he’s a “Large Scale Zero Trust Deliverer,” which is part of his multifaceted CSO charge.