The Office of the Comptroller of the Currency (OCC) said Tuesday (April 8) that it notified Congress of a “major security incident” in which there was unauthorized access to OCC emails and email attachments. The agency discovered some unusual activity on Feb. 11, activated its...
Now more than ever, cybersecurity is defined by an ongoing arms race. As enterprises and organizations seek to secure their perimeters with sophisticated technological walls, leveraging artificial intelligence (AI), machine learning and other tactics. threat actors and cybercriminals are working to build taller and taller...
The concept of the organizational perimeter is a constantly evolving one. Today’s enterprise security perimeter is, and must be, everywhere, as back offices are more and more moving to the forefront of an effective cybersecurity posture. Decades ago, corporate tech stacks were primarily defined by physical...
Enterprise cores and business-line technology stacks have increasingly moved to the cloud. But as enterprises expand their digital footprints, the data they generate, store and transfer becomes increasingly vulnerable to interception, manipulation or outright theft. The threat environment today has progressed to the point where...
Oracle staff reportedly told some clients that a hacker stole some old client login credentials. The hacker accessed usernames, passkeys and encrypted passwords, Bloomberg reported Wednesday (April 2), citing unnamed sources. Oracle did not immediately reply to PYMNTS’ request for comment. This incident is separate...
Historically, banks built security the same way they built vaults: thick walls, high fences and minimal exposure. But digital transformation has upended that perimeter. Open banking APIs, third-party FinTech integrations, cloud-native architectures and rapid app deployments have created an attack surface far too broad for...
A part of the U.S. Department of Homeland Security (DHS) responsible for identifying and monitoring cyberattacks has come under scrutiny as the Department of Government Efficiency (DOGE) looks to make spending cuts across the board. The Cybersecurity and Infrastructure Security Agency (CISA) — part of...
A deep dive into Federal Deposit Insurance Corp.’s (FDIC) Office of Inspector General’s latest audit and report on the agency reveals key risks to banks: They face threats from cyberattacks and from vulnerabilities in third-party relationships. As the number of problem banks remains elevated, the...
The cloud environment is, as a class, mostly secure. But the way that enterprises, and their employees, actually utilize the cloud service ecosystem is not. That was the insight that helped a startup’s founding team scale and sell their first cybersecurity company, Adallom, to Microsoft...