For at least the third time in recent months, a mobile fitness app maker apparently has exposed consumers' sensitive personal information. The latest app to expose data: PumpUp.
Application Programming Interfaces (APIs) are a set of operations used for accessing a web application.
Today, the "API economy" is quickly changing how the world interacts. Everything from photo sharing, to online shopping, to hailing a cab is happening through APIs. Because of APIs, technical innovation is...
While board level executives understand the concepts and terms used in network security and perimeter security, application security, as a concept and discipline, is not quite firmly defined. AppSec is much different than other security domains, so applying the standard methods does not necessarily address the unique...
What are the risks and damages from DDoS and web application
attacks? How have DDoS attacks changed? What motivates web
application attackers?
Download this infographic to learn the answers to these questions
and more.
In viewing this content, we would like to share your data
with the content...
We all know that May 25 was the enforcement deadline for Europe's General Data Protection Regulation. But what impact will General Data Protection Regulation have on cybersecurity programs?
GDPR, or the "Y2K" of our era, is part of a larger conversation that's been catalyzed by a lot of the recent news around...
As attackers get increasingly sophisticated in reverse-engineering applications, it is imperative that enterprises secure trusted applications that are reaching back into the datacenter from beyond the perimeter, says Rusty Carter of Arxan Technologies.
Ovum Research and Entrust Datacard experts discuss the transformation of identity and where it is headed.
Watch this video to learn more about:
Real-world examples of how organizations are embracing mobile and cloud platforms.
What matters most, right now, to the information security community? At RSA 2018, RSA's president said WannaCry was a wakeup call for vulnerability and risk management. Other experts see artificial intelligence, machine learning and secure coding as hot trends.
In today's dynamic healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. As attackers become more sophisticated, and as IT innovation continues to pick up pace, the escalation of cyber risk can easily overwhelm organizations with limited resources.
Download this...
Today's reality is that attackers are always present. Deception technology is purpose-built to stop advanced attacks and align security operations to top business risks.
In this white paper, we offer three examples of how financial services organizations are leveraging deception technology to get ahead of advanced...
Every day your organization's employees help cyber-attackers - not intentionally, but because the ordinary activity of sharing data and accessing corporate resources creates an "access footprint" that attackers can use to move toward your critical systems.
Download this whitepaper to learn more about:
A quick...
Have you heard the statistics supporting the fact that every enterprise - from airlines and appliance manufacturers to banks and hospitals - needs to make a digital transformation? By 2020, 72% of the world's employees will be mobile workers, more than 20B devices will be connected to the internet of things and we'll...
How Emerging Tech Can Change the Anti-Fraud Landscape
For the past year, the buzz about artificial intelligence and machine learning has been overwhelming. But Ricardo Villadiego of Cyxtera sees promise in how these technologies can help organizations fight back against fraud.
In this interview transcript from...
Machine learning is revolutionizing fraud prevention. Online businesses everywhere are discovering how this innovative technology increases revenue, while minimizing risk.
But how can it work for you?
Download this whitepaper to learn more about:
Why machine learning excels at preventing all types of fraud and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.