The latest executive report published by IBM Institute for Business Value puts the estimated cost of cyber crime to the global economy in a range of USD 375–575 billion per year. Reputational damage, which is hard to calculate, comes on top of all this. No industry and geography has remained
All the technology in the world applied to thwarting cyber threats can certainly have an impact. But the human factor plays a vital, complementary role in being smarter about cybersecurity. See how the role of humans in cybersecurity was emphasized in expert quotes culled from the recent IBM
The human factor plays a vital part in being smarter about cyber security. See how the role of humans in cyber security was emphasized in expert quotes culled from the recent IBM Insight at World of Watson 2016 conference.
Renew your challenge against cyber crime with the aid of advanced analytics, powered by cognitive computing capabilities. To learn more, listen as cybersecurity expert Morgan Wright and cybersecurity and risk management consultant Shahid Shah discuss a world in which unusual suspects have become
Cyber crime is no longer a mere nuisance but is quickly becoming a huge problem. Just recently, a cyber criminal was charged with wire fraud and computer fraud as he tried to steal more than $1.5 million. Cyber criminals are becoming increasingly more brazen as they exploit vulnerabilities in new
Cyber crime is no longer a mere nuisance but is quickly becoming a huge problem. Just recently a cyber criminal was charged with wire fraud and computer fraud as he tried to steal more than $1.5 million. Cyber criminals are becoming increasingly more brazen as they exploit vulnerabilities in new
No letup in cyber crime can be achieved without a concerted effort by everyone. Hear what cybersecurity experts have to say about the collaborative approach to fighting cyber crime in a recent Analtyics Brief.
The story is familiar. Technology innovation develops at a rapid clip, but agile threat actors seem to never be far behind. Hear what two cybersecurity experts have to say about minimizing cyber crime through artificial intelligence, cognitive computing and connected Internet of Things devices.
The ongoing struggle between good and evil that characterizes the ongoing battles between cyber warriors and cyber criminals only grows more technologically complex. Hear what leading cybersecurity leaders have to say about the application of artificial intelligence and cognitive computing to help
Analytics enables banks to comply with regulations and reduce the risk of fraudulent practices in four major areas. These innovation-driving areas include identifying suspicious transactions, staying within the law to uncover predatory lending practices, defending against online threats and
For the financial services industry, the presence of cybersecurity vulnerabilities and an uptick in fraud seem to beg the proverbial chicken-and-egg question: which begets the other? Hear what noted security experts have to say about this and other key questions in this recent podcast.
How can public agencies, law enforcement and citizens utilize advanced technologies to their advantage in the war on cyber threats, terrorism, fraud and crime? Hear what leading security experts have to say in a recent Analytics Brief on staying ahead of cyber criminals, terrorists and hackers.
Don’t miss your chance to get acquainted with the dark web in this live panel discussion hosted by IBM’s Bob Stasio. When you do, you’ll hear security experts’ latest thoughts about everything from private-sector entities’ place in the dark web to shutting down the dark web entirely.
Ever hear of the dark web? The reality is, the dark web is bigger than just hidden services, some of which exist on Tor and some of which exist on clear web sites. Learn more about how the dark web is made up of sites and activities that pretty closely mirror offline crime statistics and what we
Identifying threats and vulnerabilities in the modern security landscape is an ever more arduous task. To stay ahead of a broadening range of multifaceted threats, enterprises need to employ solutions that can help them ingest and analyze disparate data from a variety of internal and external