article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

The Verizon DBIR 2020 report indicates that financially motivated attacks against retailers have moved away from Point of Sale (POS) devices and controllers, towards web applications. Figure 1: Web application breaches in the Retail industry. Fraud and scams move to the web. Source: Verizon DBIR 2020. Securing digital transactions.

Security 143
article thumbnail

Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec

The Security Ledger

We talk about the growing demand for security automation tools and how the chronic cyber security talent shortage in North America and. In this Spotlight Podcast, we speak with David Brumley, the Chief Executive Officer at the security firm ForAllSecure * and a professor of Computer Science at Carnegie Mellon University.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is email really the nemesis of better collaboration software?

ChiefTech

But people aren't always convinced - they want to know why they should use a new tool over email which has generally served them quite well, what Andrew McAfee called the 9X email problem. When did email become an essential business tool? Source: Buerger, D. But today the business world is in love E-Mail. Source: Chalstrom, B.,

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

During a normal monitoring activity, one of the detection tools hits a suspicious email coming from the validtree.com domain. TA505 hacking group has been active since 2014 focusing on Retail and banking sectors. I am a computer security scientist with an intensive hacking background. Introduction.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Imagine a world where the retail value of your car actually grows over time – that’s now becoming a reality. There is also less hardware and compute power to work in your typical IoT device when compared to traditional devices, so embedding security becomes a matter of choice, rather than necessity. They have design constraints.

IoT 77
article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

aw (unknown). Ransomware.

article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

Drones currently occupy a unique legal position as they are classified as both aircraft and networked computing devices. According to research firm Statista, the global retail drone market is expected to reach $90 billion by 2030, with Defense, Enterprise, and Logistics being the primary industries driving growth. Market overview.