Banks face increased pressures to strategically balance the personal relationships with consumers and businesses and at the same time, embrace new technologies that make their services and products readily available to their customers from anywhere and at any time. Financially-motivated threat actors target banks large and small to monetize their sensitive data and assets, jeopardizing business loyalty and customer trust in addition to revenue. In this use case, we will share how our services enabled a regional bank to detect and mitigate these attacks before they impacted their business, brand and reputation.
Home » Data Loss Detection » Regional Bank Customers at Risk Due to Data Loss and Payment Card Fraud
How ADP Manages 3rd Party & Supply Chain Risk
Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks ...
Error - something went wrong!
Other content in this Stream
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar
Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula
Marriott Faces GDPR Fines - A DPO and CISO Discussion
Harrison (@pseudohvr) is joined by Digital Shadows co-founder and Data Privacy Officer, James Chappell (@jimmychappell), as well as CISO Rick Holland (@rickhholland), to discuss the news this week...
Harnessing Exposed Data to Enhance Cyber Intelligence
We will walk you through each stage of this exploited data cycle to illustrate the economy of exposed credentials, and then present ways you can protect and mitigate the threats targeting your organiz
Data Loss Detection Overview
SearchLight enables you to detect Employee Credentials, Sensitive Documents and Technical Information, Intellectual Property, and Customer Data
Detecting Exposed Credentials | Case Study
See how one large bank detected more than 50,000 exposed credentials in 1 year.
Weekly Intelligence Summary 04 Jul - 11 Jul 2019
Two previously unseen malware variants have been attributed to the financially motivated “TA505” in attacks on various organizations worldwide, even as the threat group continues to rely on commonly u
2.3 billion files exposed across online file storage technologies
Currently 2.3 billion files are being made publicly available by misconfigured and non-secured technologies used to store this data such as Amazon S3 buckets, Server Message Block (SMB), File Transfer
How to Detect Data Loss with Digital Shadows SearchLight™
Detect exposed credentials, sensitive documents, proprietary code, intellectual property, and customer data. Learn more at https://www.digitalshadows.com/digital-risk-solutions/data-loss-detection/.
Detecting Exposed Company Data: The What, Why, and How
What is data loss detection? A fundamental responsibility for any IT security professional is to secure their information assets, be ...
Leaky SMB File Shares – So Many Bytes!
Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...
A Practical Guide to Reducing Digital Risk
This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.
The CyberWire Daily Podcast: Too Much Information: The Sequel
Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
SingHealth Breach Post-mortem: Key Findings
On 10 January 2019, Singaporean authorities finally released a report detailing how the attack against Singapore’s largest group of healthcare ...
Digital Risk: The C-Suite's Critical Missing Part of Overall Risk
In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.
Security Practitioner’s Guide to Email Spoofing and Risk Reduction
In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we ...
FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar
Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr
Too Much Information Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposing 1.5 Billion Files
Digital Shadows finds 1.5 billion business and consumer files exposed online – just one month before businesses face €20m fines under GDPR legislation.
Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It