Marilee Philen, Senior Cyber Threat Analyst, To Speak At Atlanta Cyber Security Summit

Posted by Greg Mancusi-Ungaro on Thu, Mar 31, 2016

Marilee Philen, senior cyber threat analyst at BrandProtect, will be speaking at next week's Atlanta Cyber Security Summit .  She will join U.S. Assistant Attorney General, the Honorable John P. Carlin along with experts from the FBI, US Secret Service and other cyber security leaders in an all day exploration of emerging cyber threats related to new risks presented by Internet of Things, the vulnerabilities of big data and cloud computing deployments. The day will close with a discussion of the state of cyber threats and the strategies to combat them.

Philen is uniquely qualified to join in this discussion, she is an ex-USAF Intelligence Analyst, with a 20+ year career in intelligence collection, analysis, and reporting.

She has served with the U.S. Air Forces-Europe, U.S. Air Force Special Operations Command, and the U.S. Strategic Command Center (USSTRATCOM).

Read More

Topics: cybercrime, Internet Threats, cyber threats, OSINT, CISO, InfoSec, Internet of Things, Threat Intelligence

Healthcare Markets Are Under Threat

Posted by Greg Mancusi-Ungaro on Tue, Apr 21, 2015

Recently, on Dark Reading, Sara Peters and Ericka Chickowski wrote a great piece that ran about PII-centric attacks and threats in the healthcare market.

As the Health Care marketplace moves online, opportunistic criminals are retraining their attacks to focus on Health Care consumers.

Over the past decade, there has been enormous pressure on the healthcare industry to move health records online.  Today, according to studies recently published by the U.S. Department of Health & Human Services, almost 90 percent of all doctors and almost 75 percent of all hospitals have deployed at least a basic electronic health record system. And, these adoption rates have soared over the past five years. Insurance reimbursements have been managed online for years, and healthcare enrollments through employers are increasingly managed through a Web browser. The rollout of the Affordable Care Act, with its online purchase model, further accelerated the migration of healthcare to a predominantly online model.

Read More

Topics: Identity Theft, Security, Brand Governance, Internet Threats, Chief Security Officer, PII, CIO,, Health Care

Why Social Media Risk Planning is Necessary for Brand Image

Posted by Natalie Gleba on Fri, Jul 11, 2014

It is no surprise that 84% of businesses have now adopted social media to implement an online presence to communicate with customers and overall, increase their brand reach [1]. Whether a small independent business or a large B2B company, it is more evident than ever that businesses who do not build and maintain an online social media presence will get left behind, and evidently lack competitiveness. Having a social media presence offers clear advantages for marketing and sales departments, however, with this comes the disadvantage of having increased social media risks that could potentially harm the company’s brand. Therefore, it is extremely important that businesses adopt a Social Media Risk Plan to manage their reputation online and know how to mitigate potential threats.

Read More

Topics: Brand Protection, risk management, defamatory, brand abuse, online brand protection, Reputation Management, Social Media Monitoring, employees social media, online identity, social media, Internet Threats, Risk, internet security, cyber threats

Top 5 Social Risk Strategies for Financial Institutions for 2014

Posted by Shanna Gordon on Fri, Feb 28, 2014

As the social media ecosystem continues to evolve on a daily basis, so do the risks to your brand and reputation. Monitoring social media for risk is a no-brainer these days, but there are other channels you need to be looking at to ensure you are covering all your bases.  

Read More

Topics: Brand Protection, risk management, online brand protection, Internet Threats, Risk, internet security

Changing Tides of Social Media Compliance

Posted by Matthew Brienza on Sun, Sep 29, 2013

What started as a fad viciously grew into a worldwide source for communications. Today the tides of social media continue their fast changing and unpredictable course. The difference between now and then is the far superior widespread use of social communication. Insurance companies, banks, telephone companies, you name it they use it and most companies use social media in the majority of their internal departments. It’s used to send communications externally as well as internally. It’s used to recruit new employees, to send marketing campaigns, to research consumer habits. Social media is an extremely valuable and cost efficient asset for companies to communicate with a massive consumer base. Marketing, Human Resources, Customer Service, Legal, all of these departments are reaping the benefits of social media but do they understand the risks involved?

Read More

Topics: risk management, online brand protection, Social Media Monitoring, social media, Internet Threats, FFIEC

Movers and Shakers in Internet and Trademark Enforcement Attend Philadelphia Conference

Posted by Rosemary Brkopac on Tue, Apr 16, 2013

On March 7–8, 2013, Philadelphia, Pennsylvania, USA was the epicenter for IP practitioners seeking clarity and actionable advice in the areas of global brand portfolio management, enforcement in social media, and opportunities and challenges in the new generic top-level domain (gTLD) landscape. Some 177 participants from around the globe braved blustery conditions to attend nine fast-paced sessions held over two days. 

Read More

Topics: trademark issues, online brand protection, ICANN, gTLD, Internet Threats, trademark, gTLDs

Online Trust Alliance briefing on Anti-Botnet Best Practices

Posted by Michael Kiefer on Wed, Dec 12, 2012
Read More

Topics: Security, Internet Threats

Banks are trying to fight cybercrime, but their hands are tied

Posted by Dylan Sachs on Wed, Sep 12, 2012

These days, it’s tough to find someone who hasn’t at least been sent a phishing email, let alone responded to one.  Being the go-to computer guy in my family, I’ve had to deal with “can you just look at this email and tell me what you think?” or “Microsoft called me about my computer being hacked, can you come fix it?” on more than one occasion.  And it’s not just my grandparents that I’ve had to educate, but younger family members as well – to support this finding, Norton released their Cybercrime Report last week which showed that Millennials were more likely to fall victim to cybercrime than Baby Boomers.  To think, here I was worried about old dogs learning new tricks, when the new dogs were the ones that needed the most help.

Norton says that cybercrime cost $110 billion over the past 12 months – quite the lucrative venture, it seems, especially when you fail to see much in the way of prosecuting the offenders.  We’ll occasionally hear about some high-profile carder or malware author’s arrest, but it seems that owners of file-sharing companies are of greater importance to law enforcement.  Perhaps the banking associations need to hire the MPAA’s lobbyists.

Read More

Topics: Malware, Identity Theft, Security, data breach, Phishing, cybercrime, Internet Threats

Recent Posts

Posts by Topic

see all