Cybercrime

The Phishing Breakthrough Point

Eectiveness of Phishing, Training & Understanding the Human Response Executive Summary Utilizing security awareness training and phishing security tests can be a useful and eective tool to reduce unintentional insider threats. However, if robust metrics are not put in place to eectively gauge the click rate patterns from a human landscape perspective, phishing tests can […]

The Phishing Breakthrough Point Read More »

2020 Cyber Threatscape report

EXECUTIVE SUMMARY In the past year, security strategies and practices have been tested like no other. Rapidly accelerated digital transformations, opportunistic phishing campaigns, discontinuity of information security operations and financial constraints are creating the perfect storm in a COVID-19-disrupted world. CISOs who understand these challenges and can pivot their security approach can help their organizations

2020 Cyber Threatscape report Read More »

2020 Payment Security Report

In this report, we distill a range of Payment Security and compliance subjects into valuable insights to help CISOs and others break down complex thinking into digestible bits. We explore various tools, tactics and methods applied by numerous organizations and take a look at why some companies accomplish so much more than others in their

2020 Payment Security Report Read More »

The changing face of cybercrime

January to June 2020 has seen societal change on a global level, as COVID-19 continues to impact the global digital economy, regional economies, industries, businesses and consumer behavior. This includes an increase in cybercrime. Online transaction volumes in the LexisNexis® Digital Identity Network® continue to grow, particularly across online retailers and digital banking services. However,

The changing face of cybercrime Read More »

The Hacker Infrastructure and Underground Hosting: Services Used by Criminals

Trend Micro has released research that states organizations’ on-premise and cloud-based servers are compromised, abused and rented out as part of a sophisticated criminal monetization lifecycle. To understand how the criminal underground operates, one need to understand not only the criminals, their motivations, and their business models, but also the infrastructure and services that underpin

The Hacker Infrastructure and Underground Hosting: Services Used by Criminals Read More »

PLEASE COMPLETE