article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

28, 2023 – AppDirect , the world’s leading B2B subscription commerce platform, today released key findings from its IT Business Leaders 2024 Outlook Report. In fact, all of their other concerns—malware, stolen data, phishing, ransomware and misconfiguration of cloud services—include an element of human error and/or malice.

article thumbnail

Meet Thales at the KuppingerCole European Identity and Cloud Conference 2023

Thales Cloud Protection & Licensing

The B2B IAM Gap On the event’s last day, don’t leave without listening to Marco Venuti , IAM Business Acceleration Director. Marco will discuss the B2B IAM Gap Between Modern Demands and Current Practices on Friday, May 12, 2023, from 11:45—12:00. These challenges are long-lived in the B2B identity management space.

Cloud 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What the Email Security Landscape Looks Like in 2023

Security Affairs

Email Threats Are Becoming More Sophisticated There are a number of ways that email can be leveraged to compromise the security of an organization, but the most prominent approach is phishing. Today, according to the Verizon 2022 Data Breach Investigation Report , phishing is one of the leading five tactics used to initiate data breaches.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron: Phishing, pretexting, SMS toll fraud, baiting and tailgating are among the common tactics used by cybercriminals.

article thumbnail

Data Breach: Millions of Phone Numbers, Recordings, and Call Logs Compromised in Ringostat Data Leak

Security Affairs

Ringostat is an Eastern European company specializing in call-tracking, analytics, and other marketing aids for smartphones. Scams, Phishing, and Malware: It is common for unethical hackers and criminals on the Internet to use personal data to create trustworthy phishing emails. The leak has since been secured. What’s Happening?

article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

These baseline account takeovers can then be leveraged to spread spam, distribute phishing scams, launch denial of service attacks, infiltrate and plunder networks, execute wire fraud and more. Thus, what we’re experiencing today is the blossoming of B2B and B2C commerce transacted digitally.

Security 140
article thumbnail

News alert: Memcyco report reveals only 6% of brands can stop digital impersonation fraud

The Last Watchdog

The creation of fake websites used for phishing-related attacks (which are a top cause of account takeover (ATO)) is a growing problem that has earned cybercriminals an astonishing $1 billion+ in 2023 alone, according to data from the U.S. Global Surveyz was established in 2020 and is the brain-child of Ramel Levin.

B2C 162