Unlike other malware, ransomware practically screams and shouts at victims, and that distinct behavior holds promise for helping to better detect and block ransomware infections, according to Northeastern University security researchers.
Due to the increase in security breaches over the past few years, you know that legacy approaches to data center security are not adequate. Micro-segmentation could be the answer - but what does it really mean and how do you do it? Read this solution overview to find out.
This brief explains why it's time to take the next step toward the software-defined data center, and apply network virtualization and micro-segmentation to the network. It empowers infrastructure architects to react quickly to prevent breaches.
Build a fundamentally more agile, efficient and secure application...
Discover how micro-segmentation, delivered through network virtualization, provides comprehensive data center security, accelerates delivery time, and enhances the agility of your data center. Download the eBook here.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX...
This handy guide highlights some of the key benefits of securing your data center from within using micro-segmentation. Get started now.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization featuring Intel® Xeon® processors and Intel® Ethernet...
Colin McKinty of security firm BAE Systems - hired by SWIFT in the wake of the $81 million heist from the Bank of Bangladesh - explains why BAE now believes the malware used in the SWIFT-related attacks is not unique.
London's Metropolitan Police Service is under fire for continuing to use 27,000 PCs that run the outdated Windows XP operating system, as well as paying for a pricey extended-service contract.
A very advanced and targeted cyber-espionage campaign has been active for five years, and employs stealthy malware that can penetrate air-gapped networks and exfiltrate data using multiple techniques, security researchers warn.
Did security researchers at financial solutions provider NCR unveil a security flaw with EMV - one that could allow hackers to steal card data from EMV chips and clone it on magnetic stripes?
Flaws in Qualcomm chipset software used by an estimated 900 million Android smartphones and tablets could be exploited to seize control of devices and steal any data they store, warns cybersecurity firm Check Point.
In the wake of the recent hack of the Bitfinex bitcoin exchange, the stability and security of cryptocurrency is again being questioned. In this video interview, cryptocurrency expert Robert Schwentker contends the attack, and others like it, could lead to regulation of cryptocurrencies.
Business email compromise scams have caused billions in losses. An inside look at one Nigeria-based group shows a surprising profile of the threat actors.
The reported theft of $69 million worth of bitcoins from a Hong Kong-based exchange highlights the continuing challenges around keeping large quantities of digital currency out of the reach of hackers.
The European Commission's Payment Services Directive II, or PSD2, stands to revolutionize the payment industry. In addition to driving innovation and competition, the new regulation calls for a new generation of customer security.
As the volume of financial transactions in remote channels increase, so does the...
Cyber security practitioners commonly lament that reducing consumer fraud would be a whole lot more effective if only the products could understand the business better. This is especially true with websites, the primary interface for businesses with its customers. Beyond the login, it is important to have visibility...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.