One banking association is lobbying to have merchants held more accountable for attacks against their networks and systems that breach card data. But will their efforts convince Congress?
In today's challenging security environment, using the best products that fulfill your business needs is paramount. So when evaluating solutions, be sure to look at all aspects of a product - including performance benchmark testing.
PassMark Software is a leading authority in software and hardware performance...
New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
This white paper discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and...
Next-generation threats require a next-generation firewall. Steve Pao of Barracuda Networks discusses his company's new firewall solution and the new levels of protections it offers.
Two new insider fraud cases showcase the challenges organizations face to detect and prevent crimes by trusted employees. "You need IT controls, but you need more than IT," says researcher Randy Trzeciak.
Third-party applications and users' risky behavior are two of mobile security's greatest enemies. But mobility expert Tom Wills says banking institutions can mitigate their risks. Here is how.
Windows 8 is coming and includes security upgrades. How should security and technology leaders approach Microsoft's updated operating system? Forrester analyst Chenxi Wang offers recommendations.
Regions Bank is the eighth U.S. financial institution apparently targeted by a DDoS attack believed to be waged by the hacktivist group Izz ad-Din al-Qassam. Experts say banks should brace for more attacks on the way.
Windows 8 is coming soon. What are the security updates in Microsoft's new operating system? Which questions should security leaders weigh before upgrading? Forrester's Chenxi Wang offers insight.
Organizations must carefully consider patch management in the context of overall IT security because it's so important to achieving sound security. Read about NIST's recommendations on how best to implement patch management.
As users increasingly use mobile devices and operate outside the traditional corporate network, the concept of "endpoint security" has to evolve. And so do your strategies to secure the endpoint from sophisticated adversaries such as advanced persistent threat.
Register for this webinar to learn more about:
Why...
Over the past few years, however, the endpoint computing model has begun to change in several ways. One visible new endpoint computing model is called Virtual Desktop Infrastructure (VDI). Instead of running the Windows operating system and applications and storing files locally on a physical PC device, VDI serves up...
More malware attacks fueled by Citadel and Reveton are getting attention from federal authorities, which say banking institutions and consumers should be on high alert. What can institutions do to mitigate emerging malware risks?
Heartland Payment Systems, which suffered a massive breach in 2009, is working to enhance POS security at the merchant level. What steps is this processor taking, and what role would it like to see card-issuing banks play?
Two men have been sentenced for defrauding accountholders whose debit cards were compromised in the Michaels point-of-sale breach that hit stores in 20 states. What was their role in an elaborate fraud scheme affecting nearly 100,000 accounts?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.