The number of people whose data was breached in 2015 exceeded that of the previous year. How do we plan to regulate these cases? What should organizations be compelled to do in order to protect the sensitive information they store?...
Fraud as a Service (FaaS) has matured to the level of diversification and specialization. In the arena of cybercrime, groups have emerged into areas of specialization, with the top of the food chain acting as general contractors.
Credit-card security should improve with the launch of EMV (Europay, MasterCard and Visa) technology. But EMV doesn’t address online purchases, which are growing much faster than in-person transactions.
New threats and vulnerabilities are always emerging. Are your security policies keeping pace? CSO's security policy, templates and tools page provides free sample documents contributed by the security community.
These are the detailed bomb threat procedures for a U.S.-based non-profit organization that promotes environmental activism and causes. A bomb threat procedure was drafted after the organization received a threat.
A study from the Association of National Advertisers (ANA) and advertising security firm White Ops, says that an increase in spending will lead to a direct increase in losses due to ad fraud. The losses are expected to reach $7.2B by...
No, this isn't about using Watson AI systems to identify fraudsters by gazing deep into their eyes: IBM has acquired a German machine learning software firm called Iris Analytics to bolster its antifraud software.
The workplace violence prevention policy of a mid-sized company with approximately 500 employees that specializes in educational software. This detailed policy covers harassment, stalking, and domestic violence concerns.