Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data exfiltration.
The malicious use of encryption is growing at an alarming rate, from 104 in 2014, to 13,542 as of mid-2016, according to...
Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network performance burdens for organizations that wish to inspect encrypted traffic.
The first in a series on encryption, this technical brief...
The Health Insurance Portability and Accountability Act (HIPAA) just celebrated its 20th anniversary in 2016 as one of the most significant pieces of healthcare-related legislation in U.S. history. Once viewed as a "paper tiger," it has taken many years for the full impact of HIPAA's data security provisions to be...
Facebook says it hasn't seen ransomware spreading through its Messenger instant messaging platform despite recent reports from researchers saying that the file-encrypting Locky may have slipped through.
Cyberattacks grab headlines. The severity and frequency of attacks hitting both small and mammoth organizations alike continue to alarm the public...but cyber security professionals are the ones who really lose sleep at night. Before waiting for an attack to occur and scrambling to put a response program into action,...
The proposed guidance from the National Highway Traffic Safety Administration focuses on hardening a vehicle's electronic architecture against cyberattacks and to ensure vehicle systems take appropriate actions even if an attack succeeds.
Apple's security defenses have improved dramatically in recent years, but poorly written drivers in third-party applications could provide key access to critical parts of macOS.
When it comes to describing the top fraud threats to UK financial institutions, it's all about compromised identities and credentials, says John Marsden of Equifax. How can organisations prove their customers are who they say they are?
This case study delves into how El Paso Area Teachers Federal Credit Union was able to use strong authentication to simultaneously:
Secure access to all applications
Eliminate the cost and frustration of password resets
Improve employee productivity and satisfaction
In the face of evolving cyberthreats, organizations of all sizes need a more resilient cybersecurity architecture.
In an interview about achieving resilient cybersecurity, Kaczmarek discusses:
How security leaders can prioritize their defenses again the many threats they face;
The benefits of using a hybrid...
It's a story you'll watch unfold time and time again. The breach. The headlines. The confusion. The public apologies. The finger-pointing. And it's often followed by some form of the following statement: "But I was compliant." Compliance is never enough. The challenges are understandable, but taking the path of least...
The rising cost of pharmaceuticals is an unfortunate reality that can render patients unable to afford medication. This struggle was evident to Dr. Michael Rae who created the Rx Savings Solutions app that helps consumers save on prescription costs. Dr. Rae is a medical expert, but since technology is not his forte,...
The Health Information Trust Alliance (HITRUST) began a search for a secure cloud solution for their Common Security Framework (CSF) application. CSF gives businesses the structure, detail and clarity needed to more efficiently and effectively meet healthcare regulatory compliance standards, including HIPAA.
The...
In the face of evolving cyberthreats, organizations of all sizes need a more resilient cybersecurity architecture. Michael Kaczmarek of VeriSign describes how to achieve this resiliency.
As pressure to speed the development of applications intensifies, CISOs must be the "voice of reason," taking a leadership role in ensuring security issues are addressed early in app development process, says John Dickson, principal at Denim Group, a Texas-based security consultancy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.