DEFENSESTORM
Thought leadership and customer testimonials are some of the many ways we build a community of trust. These resources highlight our recent research and success stories.
Insights
DefenseStorm has updated its GRID Active Fraud Detection, further enhancing its capabilities as a powerful cyber risk management solution. Organizations can now join the Community Watchlists within GRID Active Fraud Detection, where they not only receive alerts of new threats, but can add a threat to the watchlist directly from the Alert view.
Insights
NIST’s Cybersecurity Framework (CSF) is designed to help institutions of all sizes and sophistication levels manage and reduce their unique cybersecurity risks. With the release of CSF 2.0, the guidance provided by NIST has expanded the practice and controls that institutions can use to best understand, assess, prioritize, and communicate its cybersecurity efforts.
Insights
With election season beginning to ramp up, it’s important to be aware and prepared for the barrage of phishing, smishing, vishing, and other “ishing” scams and campaigns that are sure to follow. Just this weekend, I received multiple texts related to voting and polling, so let’s explore a few of the common scams and tactics that bad actors will try to leverage to obtain your personal information.
Insights
Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. As investment from fast-moving threat actors continues to increase, traditional security practices are unable to keep up.
Insights
DefenseStorm has recently updated its GRID Active Governance Program with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution. Organizations now can link dashboards to task schedules for scheduling and documenting report reviews.
Insights
DefenseStorm has recently updated its GRID Active Risk Assessment with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution with GRID Active Risk Assessment Exceptions.
Insights
Apple just rolled out a new default feature for iPhone and Apple watch that allows nearby users to share contact information with one another. This feature has sparked some concern in online social communities and even prompted law enforcement agencies to release statements and privacy warnings over the last few days due to the concern that people could “drop” information on another user’s phone at random, which seems scary.
Insights
Insights from the desk of Chief Information Security Officer, William Wetherill
Insights
Cybersecurity is a critical concern for any organization, regardless of its size or industry; however, for financial institutions (FIs), it’s vital due to the sensitive data and valuable assets they are entrusted to safeguard. While there are many aspects to consider in building a robust cybersecurity program, one crucial component is effective asset management.
Insights
Powered by machine learning to help better proactively detect fraud, financial institutions can monitor suspicious non-monetary activities for individuals to complement rules-based approaches and detect fraudulent activities.
Insights
If you stay up to date with cybersecurity news and events, you are likely bombarded with technical analysis of the latest ransomware, malware, dropper, trojan, or vulnerability that was exploited by bypassing controls and using “living off the land” techniques. While these tactics, techniques, and analyses are incredibly important and useful, we can often forget that it’s sometimes the simple, age-old ways of getting your information and property that can also harm us.
That’s where SIM swapping comes in.
Insights
As fraud detection and prevention continue to be crucial in today’s digital landscape, it’s imperative for fraud investigators to utilize efficient tools that empower and support their investigative work. The current Trigger and Alert views have been strategically modified to enhance the service provided to fraud investigators where they can now see relevant information that is intuitive to their role.
Insights
In our final entry into our series, AI and its Impact on Cybersecurity, we will explore how DefenseStorm utilizes AI in our own built-for-banking technology.
Insights
Innovative technology has revolutionized the way we work and live by unlocking a wealth of new capabilities. As artificial intelligence makes daily operations more efficient and flexible, people become increasingly reliant on the luxury of digital technology. Of course, businesses then competitively introduce the latest and greatest to meet the demands. With new technology and changed business operations comes exposure to new cyber risks, prompting companies to prioritize and invest in stronger cybersecurity measures.
Insights
The financial sector has seen a significant transformation due to digital technology. The industry has been pushed to be more dynamic to meet the demands of customers, regulatory requirements, and security threats, and remain competitive while safeguarding customer data and assets.
Insights
Business email compromise (BEC) is a type of cyberattack that usually occurs through some type of social engineering campaign where the criminals assume the identity of a trusted person or organization and attempt to influence their victims into providing money through transfers or other digital payments, divulging personal information, making phony purchases, providing credentials to accounts, etc
Insights
The previous posts in this series have covered topics like shifting from cybersecurity to proactive cyber risk management, reinforcing cyber risk readiness, bridging communication gaps, and harnessing the power of a buyer’s guide to build a robust cyber risk management solution. While these are integral to designing an efficient cyber risk management program, the final and crucial piece of the puzzle is cyber risk awareness. If your employees lack awareness of the constantly evolving threats to your financial institution (FI), they become a significant liability to your security, despite your adherence to the latest recommendations and employment of state-of-the-art technology.
Insights
The role of artificial intelligence (AI) has had an unprecedented impact on cybersecurity. AI is transforming daily business practices and enhancing the customer experience for most industries, but it is imperative to effectively balance technological advancement with close oversight while these technologies are rolled out.
Insights
NCUA Cyber Incident Notifications Requirement goes into effect September 1, 2023. The final rule requires that covered institutions notify the NCUA as soon as possible, and no later than 72 hours, after the credit union reasonably believes it has experienced a reportable cyber incident or received a notification from a third party regarding a reportable cyber incident.
Insights
In the Redefining Cybersecurity: Bridging the Communication Gap blog, we discussed resources and tools that can help open a dialogue with decision-makers. One of the resources is a Buyer’s Guide which was created by DefenseStorm as a vendor-neutral tool to help financial institutions (FIs) efficiently shop around for new solutions.
Insights
An effective cyber risk management strategy requires everyone within the FI to work together with a unified goal for budget allocation and solution implementation.
Insights
Military, law enforcement, and first responders train constantly to be prepared for anything that they may face during their careers, so when those particular situations arise, they are confident, efficient, and knowledgeable about how to deal with and resolve the incident. Incident response in cybersecurity is no different.
Insights
With a deeper understanding of this shift in ideology from reactive to proactive solutions, the question arises about your financial institution’s (FI’s) level of cyber risk readiness.
Insights
In this series, Redefining Cybersecurity, we will walk your FI through the process of evaluating your current state of cyber risk readiness so you can employ more efficient solutions to stay threat ready and compliant.
Insights
By following a well-established response plan, organizations can help ensure the confidentiality and integrity of their systems and data.
Insights
With a resolute effort to unite against the threat of cyber fraud, Fraud Fusion Centers are being embraced across all industries to effectively combat cyber fraud.
Insights
As artificial intelligence (AI) technology enriches various aspects of our lives, a critical question remains regarding whether its capabilities and implications will drive cybersecurity toward success or serve as a catalyst for its downfall.
Insights
GRID Active Threat Surveillance now includes an Incident Similarity feature which leverages machine learning to enhance incident management.
Insights
Navigating the complex world of financial regulations and data retention just got easier with DefenseStorm’s latest innovation.
Insights
DefenseStorm offers a proactive approach to cyber risk management so financial institutions can stop cyberthreats before they become destructive cyberattacks, allowing them to better protect their account holder and communities.