Quantcast
Channel: 4iQ
Browsing all 59 articles
Browse latest View live

4iQ Warns CISOs on Holiday Season Spike in Breached Credentials: Your Peers’...

With password re-use rampant, 4iQ offers free service and trial for eCommerce and financial services companies 4iQ, a leader in Identity Theft Intelligence, announced today it has fast-tracked to...

View Article



Focusing on the Real Victims of Breaches: The Users

HSBC Bank’s latest data breach impacted roughly one percent of its U.S. accounts. While the number of affected individuals is minor in comparison to the recent Facebook and Google+ security breaches,...

View Article

The Dawn of the Code War aka The Blurred World War

John P. Carlin has a fascinating new book out about “how we tried to take cyberthreats out of the shadows and used the criminal justice system to shine light on cyberattacks.” Co-authored by journalist...

View Article

4iQ Secures $18 Million Series B Funding

Since 4iQ’s inception, we have been known for our powerful tools and proven ability to find stolen identities on the deep and dark web and alert those who are at risk. With our recent announcement that...

View Article

2019 4iQ Identity Breach Report

We published the 2019 4iQ Identity Breach Report “The Changing Landscape of Identities in the Wild: The Long Tail of Small Breaches.” The report was built using an extensive collection of breached and...

View Article


It’s Time for a Change – by Doug Dangremond

Blog post by Doug Dangremond, Sr. Vice President of Sales, on why he joined 4iQ. On the path of life we occasionally find that the road before us diverges. I recently arrived at just such a crossroads...

View Article

Keeping pace with high-stakes cyber adversaries: Why Audit Committees pose...

Blog post By George de Urioste, Chief Financial Officer, 4iQ, Inc. Combat increasingly sophisticated threats with a new resolve: Cyber Vigor In the 2019 Global Risks Report by the World Economic Forum,...

View Article

Modern-Day Manhunt: Operationalizing Cyber Attribution

While deployed to Iraq in 2007 as an intelligence analyst, Amyn Gilani, Vice President of Product at 4iQ, was assigned to the Joint Special Operations Command (JSOC) Task Force, which was in constant...

View Article


Hacked! Neil Daswani on Security Lessons from Big Name Breaches

Neil Daswani, Co-director of the Stanford Advanced Security Certification Program, and former CISO of Symantec’s consumer division (LifeLock & Norton), recently presented his lessons learned from...

View Article


Identity Protection & Data Breach Survey

2,300 US adults perceptions on the impact, concerns, roles and responsibilities on data breaches and identity protection. The results are in. As technology continues to pervade our lives, our...

View Article

Key takeaways – CyberwarCon 2019

Blog post By Amirah Saad, Sr. Manager, Intelligence, 4iQ, Inc. This year, CyberwarCon 2019, was focused on the importance of attribution, as well as identifying and exploring a myriad of threat actors....

View Article

Holiday Season Security Tips

Blog post By Amirah Saad, Sr. Manager, Intelligence, 4iQ, Inc. U.S. based consumers spent approximately $12 million per minute on Cyber Monday deals this year, leading to a record $9.4 billion in...

View Article

Focusing on the Real Victims of Breaches: The Users

HSBC Bank’s latest data breach impacted roughly one percent of its U.S. accounts. While the number of affected individuals is minor in comparison to the recent Facebook and Google+ security breaches,...

View Article


Holiday Season Security Tips

Blog post By Amirah Saad, Sr. Manager, Intelligence, 4iQ, Inc. U.S. based consumers spent approximately $12 million per minute on Cyber Monday deals this year, leading to a record $9.4 billion in...

View Article

Cybersecurity Trends to Watch for in 2020

This is a guest post by Chad Warner, Internet safety enthusiast at Defending Digital. 2020 is bound to include cybersecurity surprises, but by looking at recent years, we can make a few predictions....

View Article


Are Periodic Password Resets Necessary?

The cons of frequent resets and best practices for password management in an era of continuous evolving cyber threats.… The post Are Periodic Password Resets Necessary? appeared first on 4iQ.

View Article

How data science tools can lighten the load for cybersecurity teams

The role of data science in security operations centers; reducing manual workloads, helping identify attack patterns and increasing the chances of detecting threats before it’s too late.… The post How...

View Article


Publicly available information puts democracy at risk

Cybercriminals are weaponizing some quite rudimentary tools and techniques with criminal persistence at volume to harm individuals and businesses financially and reputationally. Learn how threat actors...

View Article

Uncover the Real Identities Behind Criminal Activities

A modern approach to crime-fighting with Adversary Intelligence and uncovering the real identity of threat actors.… The post Uncover the Real Identities Behind Criminal Activities appeared first on 4iQ.

View Article

Why hackers are more persistent than security teams

The importance of knowing your attacker –  Is it a sophisticated lock picker on your network or a script kiddie looking for an unlocked door? Equip yourself with identity intelligence for better...

View Article
Browsing all 59 articles
Browse latest View live




Latest Images