PCI Community Meeting: Timely Agenda

A Fresh Look at Card Security in Wake of BreachesThis week's PCI Community Meeting in Orlando will tackle key issues in the wake of point-of-sale malware attacks and subsequent card breaches, offering... Read more »

Bash Bug: Bigger Than Heartbleed

Hackers Target Widespread, Remotely Exploitable FlawSecurity experts are warning that millions of systems - Apache servers, Linux and Mac systems, and innumerable Internet of Things devices - may be vulnerable to a... Read more »

Fraud Tied to Home Depot Breach Mounting

Ramp Up Called 'Greater Than Target'Financial institutions are starting to report fraud tied to the massive Home Depot payment card data breach. One card issuer calls the fraud ramp up "much greater... Read more »

Fraud Fighters Eye Info-Sharing Deficit

UK Fraud Surges, But Banks Fail to Crowdsource DefensesFraudsters continue to make inroads against financial institutions based in the United Kingdom - and beyond - because banks aren't working together to share... Read more »

Security: Maximize Business Benefits

Tibco's Jean-Francois Roy on Security's Chance to EvolveWhen it comes to the evolution of machine data, security organizations now can improve protection and the top line. How can they maximize the business... Read more »

Fraud Investigations: How to Work Effectively with Law Enforcement and Government

The Private Sector Liaison Committee is tasked with enhancing partnerships and capabilities between law enforcement and private industry; support the modernization of the Canadian Anit-Fraud Centre (CAFC); and reduce the impact of... Read more »

Fraud Management – Real Time Fraud Analytics to reduce friction and improve the Customer Experience

Statistics show that poor handling of a fraud incident is a key reason organizations will lose the trust of a customer and why that customer is likely to close an account.

Fraud management... Read more »

Real World Applications of Big Data Analytics – Social Network Analysis and Post Breach Fraud Detection

All 2014 Fraud Summit Toronto recordings:

Insider Fraud Detection – The Appliance of Science

Even after the high-profile Edward Snowden leaks of information from the National Security Agency, most organizations still aren't taking insider threats as seriously as they should be. Too many organizations have not... Read more »

Shellshock Bug: How to Respond

To mitigate the newly discovered Bash bug - AKA Shellshock - which may make millions of systems vulnerable to remote takeover, organizations must take several key steps, says security expert Alan Woodward. Read more »