article thumbnail

7 critical IT policies you should have in place

CSO Magazine

Organizations are also using more cloud services and are engaged in more ecommerce activities. From a cybersecurity standpoint, the changes have been significant—in large part because many people continue to work from remote locations or alternate between home offices and corporate facilities. To read this article in full, please click here

eCommerce 129
article thumbnail

Cybercrime escalates as barriers to entry crumble

CSO Magazine

An underground economy that mirrors its legitimate ecommerce counterpart is supercharging online criminal behavior, according to a report released Thursday by HP Wolf Security in collaboration with Forensic Pathways.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: The Top Ten Industries Under Cyber Attack

CSO Magazine

According to the most recent NETSCOUT Threat Intelligence Report , vital pandemic industries such as ecommerce, streaming services, online learning, and healthcare all experienced increased attention from malicious actors targeting the very online services essential to remote work and online life.

article thumbnail

What does the Colonial Pipeline attack tell us about security today?

IT Security Guru

The first relates to reports that there was no Chief Security Officer (CSO) in place. Fast forward to today and its rare not to have a CSO for very obvious reasons. Ten years ago, whether to appoint a custodian for security was hotly debated.

article thumbnail

Target shares its own web skimming detection tool Merry Maker with the world

CSO Magazine

Sometimes referred to as Magecart attacks , they have become the leading cause of card-not-present (CNP) fraud and have impacted small and big brands alike, as well as different types of ecommerce platforms.

eCommerce 101
article thumbnail

Darwinium upgrades its payment fraud protection platform

CSO Magazine

Darwinium services large B2C organizations (with $1 billion or more in revenue) and marketplaces, dedicated payments providers, ecommerce shops, banks, and some fintechs. Use cases for the Darwinium platform include account security, scam detection, account takeover, fraudulent new accounts, synthetic identities, and bot intelligence.

B2C 82
article thumbnail

What is SSL? How SSL certificates enable encrypted communication

CSO Magazine

SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible. The decades-long history of these protocols has been marked by continuous updates that aim to keep pace with increasingly sophisticated attackers. The next major version of the protocol, TLS 1.3,