Category: EN

Australia Introduces First Standalone Cybersecurity Law

The Australian government’s Cyber Security Bill 2024 will mandate cybersecurity standards for smart devices and introduce ransomware reporting requirements This article has been indexed from www.infosecurity-magazine.com Read the original article: Australia Introduces First Standalone Cybersecurity Law

Frontegg Flows simplifies customer identity processes

Frontegg launched Flows, a journey-time orchestration capability that uses generative AI to simplify the creation of advanced customer identity processes. As growing businesses emerge from startup mode and enter scale-up mode, their user identities start to enter the thousands. In…

AI-Driven eCommerce Fraud to Top $107 Billion by 2029

There has been a dramatic rise in e-commerce fraud as the increasing use of AI-generated deepfakes poses an unprecedented security challenge for online merchants. The post AI-Driven eCommerce Fraud to Top $107 Billion by 2029 appeared first on Security Boulevard.…

Edgio Premier Bot Manager detects, classifies and mitigates bot traffic

Edgio launched Premier Bot Manager, a next-generation bot management solution designed to protect enterprise applications against increasingly sophisticated automated threats. Premier Bot Manager introduces enhanced detection capabilities, AI-powered threat intelligence, and granular categorization of known and unknown bot attacks, providing…

Trulioo Fraud Intelligence fights fraud during onboarding

Trulioo launched Trulioo Fraud Intelligence, a new capability that delivers predictive risk insights across more than 195 countries. Trulioo Fraud Intelligence transforms how global businesses fight synthetic and third-party fraud. The capability provides comprehensive coverage across diverse markets by combining…

Innovator Spotlight: Concentric AI

It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any security issues to prevent data loss and meet compliance standards…. The post Innovator Spotlight: Concentric AI appeared first on Cyber…

Guide for selecting the right GRC framework, EU edition

Governance, risk, and compliance frameworks are critical. They enable cybersecurity professionals to accurately identify an organization’s risk posture, align business and strategic objectives with technology, and meet compliance responsibilities. However, selecting the right framework can be challenging. Inside this guide…

From Perfctl to InfoStealer, (Wed, Oct 9th)

A few days ago, a new stealthy malware targeting Linux hosts made a lot of noise: perfctl[1]. The malware has been pretty well analyzed and I won&#x27t repeat what has been already disclosed. I found a copy of the “httpd”…

Financial impact of cybercrime

The financial strain on businesses is growing at an alarming rate, largely as a result of escalating cybercrimes. The financial implications of cyberattacks are becoming impossible to ignore. The increasing frequency and sophistication of these threats demand a more strategic…