Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Bob Slocum, Product Marketing Director at Tessian discusses the most sophisticated, real-world email social engineering attacks found by Tessian's threat intelligence team.
Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable, LLP and Coordinator, Better Identity Coalition and explore Identity Access Management today!
Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable LLP in an exploration of role of the FIDO Alliance in standardizing phishing-resistant logins that make authentication simpler and stronger.
Join Nischay Kandpal, Program Manager Evangelism , Product Specialist-Commercial, Microsoft as he highlights how Windows 11 enables zero trust protection.
Join Kayzad Vanskuiwalla and Harshil Doshi in a discussion of how AI is shaping cybersecurity.
Join Dr. Lopa Mudraa Basuu and Anuj Bhansali in an exploration of payment fraud and defense.
Join Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.
Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.