The 3 musts for every FinTech incident management pro

Few industries have experienced such a disruptive whiplash as the financial services industry. With the dizzying encroachment of agile, innovative, and fearless fintechs coming to the fore, traditional banking institutions have had to completely rethink their business, revenue models, and customer engagement initiatives. FinTechs take charge Fintechs have been experiencing such game-changing success due to […]

DMI Launches COVID-19 Workplace Re-Entry Solution

Bethesda, MD. ,August 06, 2020, As organizations plan for and manage employee re-entry into workplaces and schools, DMI, a leading end-to-end mobility, and digital transformation company, has launched a comprehensive safety solution to support enterprise back-to-work protocols. DMI’s Workplace Re-Entry Solution is a secure mobile application developed to address the multiple risks and challenges associated with preparing for […]

A dangerous new keylogger has been discovered

Keyloggers make up the largest volume of unique phishing campaigns by malware type today and they continue to grow in both popularity and sophistication. A new keylogger called “Mass Logger” currently being tracked by security professionals is much more sophisticated than previous versions of keyloggers that we?ve seen. The frightening difference is the fact that […]

Automation for Success in the New World

What kind of lawyer are you when it comes to repetitive tasks? Do you dive in and revel in the tedious work, or do you explore methods to accomplish the task with efficiency in mind? The fact is that individuals and firms who will succeed in this new world are those who are quick to […]

Repurchase

Repurchases Preventing loan repurchases requests from mortgage guarantors has been a major issue for mortgage bankers over the past decade.  In the early years of the last decade, the GSEs dramatically increase the number of repurchase and make-whole demands stemming from defaulted or poorly underwritten loans from the pre-2008 era.  The table below shows the […]

Data leaks should be managed like pest infestations

A well-built house serves one fundamental purpose: it protects humans from the elements. Over time, however, atrophy takes its toll. Windows begin to leak in the air; water finds its way around the foundation; and vermin tunnel down shelters in the cracks of building material. Even the least responsible homeowner takes every step to prevent […]

5 principles for effective cybersecurity leadership in a post-COVID world

As more people are working from home during the COVID-19 pandemic, cybersecurity operations are facing tremendous new challenges. Cybersecurity leaders, particularly Chief Information Security Officers (CISOs), must take stronger and more strategic leadership roles within their businesses during the crisis. Five cybersecurity leadership principles would ensure effective business continuity in the “new normal.” COVID-19 is […]

Coronavirus Phishing Emails increase 32 times since February 25

The surge in activity occurred on March 11, when the World Health Organization (WHO) declared the virus a pandemic. Since then the number of letters has been increasing daily. Data has shown that COVID-19 based attacks are much more successful than typical phishing attacks. Researchers have found that in recent letters cybercriminals use various strategies, […]

Why Fortune 500 Companies Need Domain Scanning and Keystroke Encryption

Studies show that in 2019, both the reported data breaches and the number of records exposed spiked by over 50% during the Q1 2019 compared to the previous year (source: Risk-Based Security). In a study conducted by ImmuniWeb, it was discovered that “more than 21 million login credentials had been stolen by hackers from Fortune […]