News & Analysis as of

Cyber Attacks Spoofing Cyber Threats

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Epstein Becker & Green

Cyber Coverage in the Age of COVID-19 Need Not Result in Pandemonium

Epstein Becker & Green on

While businesses and their employees continue to operate in the “new frontier” of working-from-home during the COVID-19 pandemic and the gradual reopening of the economy, a serious risk continues to present itself: the threat...more

Zelle  LLP

Conflicts in Circuits’ Approach to Email Scams Hold Lessons

Zelle LLP on

With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more

Bass, Berry & Sims PLC

Don’t Let Spoofing Fool You – SEC Says Internal Accounting Controls Should Address Cyber Threats

Bass, Berry & Sims PLC on

On October 16, 2018, the SEC released an Investigative Report detailing recent email spoofing schemes that caused nine public companies to lose a total of nearly $100 million. Building on its February 2018 guidance about the...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide