Enterprises are increasingly adopting Linux as a secure, reliable, and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions.
In particular, the Red Hat Enterprise Linux (RHEL) operating environment, which is...
Datacenters are, and always have been, investments that evolve as the industry changes, new technologies emerge, and application needs change. However, today, datacenter managers are facing a daunting future that may not include any meaningful expansion of their datacenters in terms of floor space, yet their existing...
Damballa's Q3 State of Infections report discusses the state of continuous breach that enterprises face today.
Key findings in this report include:
Malware dwell time equates to loss;
How to minimize risk of a POS malware breach;
Where the security gaps are and how to close them.
Prompted by Heartbleed and other vulnerabilities, the White House is giving the Department of Homeland Security authority to conduct regular and proactive scans of federal civilian agency networks.
Undoubtedly, your network is more complex than ever. Your employees are accessing applications, using personal or work devices, but corporate risk and security factors are often ignored. Your business is a target. Are you prepared in the best possible way? The complexity of your network and infrastructure security may...
Until recently, most businesses took a traditional, perimeter-based approach to information security. The thinking was: "If we build a wall high enough, nothing will get in." That was fine until cyber criminals started looking for unguarded cracks in the masonry, forging counterfeit keys for the padlocks and tricking...
When asked to describe the current cyber threat landscape, one of the more balanced and objective answers might be that threats are "hiding in plain sight." Today's advanced cyber threats use applications as their infiltration vector, exhibit application-like evasion tactics, and act as, or
use common network...
Moving to Amazon Web Services (AWS) can offload significant IT resource and cost burdens. However, you can't offload the ultimate responsibility for the security, privacy, and compliance of your data.
This whitepaper delves into an approach to migrate sensitive data into AWS environments while ensuring...
Unix systems face special identity and access management (IAM) challenges.
Read this informative white paper to:
Learn about those issues;
Find out how to overcome them with the right practices and tools;
Enhance security, achieve compliance and improve operational efficiency.
Much of the focus of identity and access management (IAM) is concerned with easy and unobstructed access to a large population of end users with minimal disruption to IT operations. But the forgotten arm of IAM remains privileged account management (PAM).
Read this e-book to:
Discover why PAM can be a prime...
A handful of cybersecurity bills could come up for votes next week in Senate committees. But will the entire Senate get to vote on the measures? No major cybersecurity bill has passed the Senate since 2002.
Continuous monitoring is helping Freddie Mac reduce the number of security controls it uses to safeguard its information systems, says CISO Patricia Titus, who summarizes lessons that can apply to government and private-sector entities.
A DDoS attack against Ellie Mae, which provides technologies to mortgage originators, comes just as banking regulators issue a reminder about the risks associated with such attacks. Experts offer risk mitigation insights.
A class action lawsuit filed by two banks against Target in the wake of its 2013 breach has an unusual twist: It seeks damages from Target and Trustwave, allegedly the retailer's qualified security assessor. Experts offer an analysis.
President Obama's fiscal year 2015 budget outlines a set of priorities - a wish list - of programs the administration hopes to pursue, including a federal cyber campus.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.