|By Business Wire||
|June 19, 2014 02:57 PM EDT||
Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that Ken Westin, security researcher for Tripwire, will present at ToorCamp 2014. The technology event will take place July 9-13, 2014, at the Hobuck Beach Resort in Neah Bay, Washington.
Through personal research and collaboration with law enforcement agencies, Westin has researched how organized crime rings, including those with connections to Russian and Eastern European groups, generate revenue through credit card theft. These groups profit through shoplifting, identity theft credit card skimming and other forms of fraud.
In his presentation, Westin will discuss several cybercriminal cases he helped crack and attendees will learn:
- The structure and key elements of the credit card black market.
- The connection between credit cards and the exploit market.
- How stolen credit cards fuel other forms of retail fraud
- How retail businesses can make themselves unattractive to cybercriminals.
What: How the Stolen Credit Card Black Market Works
Who: Ken Westin, security researcher, Tripwire, Inc.
When: July 11, 2014, 2:00 p.m. PDT
Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc.
Dec. 10, 2016 02:00 AM EST Reads: 1,981
Dec. 10, 2016 02:00 AM EST Reads: 540
Dec. 10, 2016 01:30 AM EST Reads: 748
Dec. 10, 2016 01:30 AM EST Reads: 3,993
Dec. 10, 2016 01:15 AM EST Reads: 1,212
Dec. 10, 2016 01:00 AM EST Reads: 1,257
Dec. 10, 2016 12:45 AM EST Reads: 455
Dec. 10, 2016 12:30 AM EST Reads: 606
Dec. 9, 2016 11:30 PM EST Reads: 1,150
Dec. 9, 2016 10:45 PM EST Reads: 538
Dec. 9, 2016 10:30 PM EST Reads: 1,727
Dec. 9, 2016 10:00 PM EST Reads: 312
Dec. 9, 2016 09:45 PM EST Reads: 2,009
Dec. 9, 2016 09:30 PM EST Reads: 1,284
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Dec. 9, 2016 08:00 PM EST Reads: 1,025