4iQ Warns CISOs on Holiday Season Spike in Breached Credentials: Your Peers’...
With password re-use rampant, 4iQ offers free service and trial for eCommerce and financial services companies 4iQ, a leader in Identity Theft Intelligence, announced today it has fast-tracked to...
View ArticleFocusing on the Real Victims of Breaches: The Users
HSBC Bank’s latest data breach impacted roughly one percent of its U.S. accounts. While the number of affected individuals is minor in comparison to the recent Facebook and Google+ security breaches,...
View ArticleThe Dawn of the Code War aka The Blurred World War
John P. Carlin has a fascinating new book out about “how we tried to take cyberthreats out of the shadows and used the criminal justice system to shine light on cyberattacks.” Co-authored by journalist...
View Article4iQ Secures $18 Million Series B Funding
Since 4iQ’s inception, we have been known for our powerful tools and proven ability to find stolen identities on the deep and dark web and alert those who are at risk. With our recent announcement that...
View Article2019 4iQ Identity Breach Report
We published the 2019 4iQ Identity Breach Report “The Changing Landscape of Identities in the Wild: The Long Tail of Small Breaches.” The report was built using an extensive collection of breached and...
View ArticleIt’s Time for a Change – by Doug Dangremond
Blog post by Doug Dangremond, Sr. Vice President of Sales, on why he joined 4iQ. On the path of life we occasionally find that the road before us diverges. I recently arrived at just such a crossroads...
View ArticleKeeping pace with high-stakes cyber adversaries: Why Audit Committees pose...
Blog post By George de Urioste, Chief Financial Officer, 4iQ, Inc. Combat increasingly sophisticated threats with a new resolve: Cyber Vigor In the 2019 Global Risks Report by the World Economic Forum,...
View ArticleModern-Day Manhunt: Operationalizing Cyber Attribution
While deployed to Iraq in 2007 as an intelligence analyst, Amyn Gilani, Vice President of Product at 4iQ, was assigned to the Joint Special Operations Command (JSOC) Task Force, which was in constant...
View ArticleHacked! Neil Daswani on Security Lessons from Big Name Breaches
Neil Daswani, Co-director of the Stanford Advanced Security Certification Program, and former CISO of Symantec’s consumer division (LifeLock & Norton), recently presented his lessons learned from...
View ArticleIdentity Protection & Data Breach Survey
2,300 US adults perceptions on the impact, concerns, roles and responsibilities on data breaches and identity protection. The results are in. As technology continues to pervade our lives, our...
View ArticleKey takeaways – CyberwarCon 2019
Blog post By Amirah Saad, Sr. Manager, Intelligence, 4iQ, Inc. This year, CyberwarCon 2019, was focused on the importance of attribution, as well as identifying and exploring a myriad of threat actors....
View ArticleHoliday Season Security Tips
Blog post By Amirah Saad, Sr. Manager, Intelligence, 4iQ, Inc. U.S. based consumers spent approximately $12 million per minute on Cyber Monday deals this year, leading to a record $9.4 billion in...
View ArticleFocusing on the Real Victims of Breaches: The Users
HSBC Bank’s latest data breach impacted roughly one percent of its U.S. accounts. While the number of affected individuals is minor in comparison to the recent Facebook and Google+ security breaches,...
View ArticleHoliday Season Security Tips
Blog post By Amirah Saad, Sr. Manager, Intelligence, 4iQ, Inc. U.S. based consumers spent approximately $12 million per minute on Cyber Monday deals this year, leading to a record $9.4 billion in...
View ArticleCybersecurity Trends to Watch for in 2020
This is a guest post by Chad Warner, Internet safety enthusiast at Defending Digital. 2020 is bound to include cybersecurity surprises, but by looking at recent years, we can make a few predictions....
View ArticleAre Periodic Password Resets Necessary?
The cons of frequent resets and best practices for password management in an era of continuous evolving cyber threats.… The post Are Periodic Password Resets Necessary? appeared first on 4iQ.
View ArticleHow data science tools can lighten the load for cybersecurity teams
The role of data science in security operations centers; reducing manual workloads, helping identify attack patterns and increasing the chances of detecting threats before it’s too late.… The post How...
View ArticlePublicly available information puts democracy at risk
Cybercriminals are weaponizing some quite rudimentary tools and techniques with criminal persistence at volume to harm individuals and businesses financially and reputationally. Learn how threat actors...
View ArticleUncover the Real Identities Behind Criminal Activities
A modern approach to crime-fighting with Adversary Intelligence and uncovering the real identity of threat actors.… The post Uncover the Real Identities Behind Criminal Activities appeared first on 4iQ.
View ArticleWhy hackers are more persistent than security teams
The importance of knowing your attacker – Is it a sophisticated lock picker on your network or a script kiddie looking for an unlocked door? Equip yourself with identity intelligence for better...
View Article
More Pages to Explore .....