Over the last twelve months the world has seen costly and destructive cyberattacks target organizations of all sizes regardless of industry or geography. With so much at stake, organizations need to know where their security programs are effective and where they are falling short.
Tenable has developed the...
Social engineering is certainly not a new problem. But it's a persistent one that continues to grow, and with seemingly no end in sight because it preys on a natural human tendency to trust.
While most financial institutions have taken significant steps to combat social engineering through user education and...
In the modern world banks no longer compete on product or price; they compete on user experience. Mobile banking is a path to offering the user experience that your customers want: one that is fast and convenient. To succeed in expanding mobile offerings, banks need to pay close attention to the security of mobile...
Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.
There is significant variation in total cyber-crime costs among participating companies. The US sample reports the highest total average cost at $15 million and the Russian...
Most businesses use the cloud for at least some applications - collaboration, email, backups and disaster recovery. And many more plan to in the next 12 months. According to "Orchestrating Security in the Cloud," a SANS survey, 40 percent of businesses store or process sensitive data in the cloud. But is it safe from...
To avoid being breached, you have to get your defenses right every single time. To breach you, hackers only have to get their attack right once. Experts advise breaches are inevitable. According to Ponemon Institute, the average time to resolve a cyber attack is 45 days, with an average cost of $35,647 per day. The...
Discover how enterprise security best practices can help you avoid suffering financial losses, damage to your brand, and damage to customer relationships caused by undetected or detected too late cyber attacks.
On average, advanced attacks now persist in the network seven months before they are detected. The time...
Continuous monitoring is among the latest approaches to keep your company safe from hackers. And according to this SANS survey, most organizations claim to have a program for monitoring systems and activities for unauthorized changes, vulnerabilities, abnormal operation, and needed patches. But how effective are...
How does your cyber security program compare to other companies? Where do your security people, processes, and technology place you among peer organizations? And more important, what should be your next steps to improve your program?
Based on their research, Enterprise Strategy Group has developed a cyber security...
The SANS 2015 survey of the incident response capabilities of more than 500 security professionals found good news and bad news. The good news is that reported malware incidents, breaches, and remediation time declined slightly compared to last year, indicating a maturing of defenses and incident response...
This e-Book is produced by Compliance Week in cooperation with ACL and HPE Security - Data Security.
Download this e-Book to learn:
CCOs Play a Stronger Role in Data Privacy
Facebook's Big Data Fail Calls for More Ethics
From ACL: The Big Data Opportunity for Audit, Risk
Management, and Compliance
Auditing in...
Applications are a primary target for cyber-attacks. Historically, Web Application Firewalls (WAFs) have been a popular choice for protecting production applications from attack. But they have limitations, and advice on how to bypass a WAF is readily available.
Download this informative white paper to...
The security of Internet-connected toys is in the limelight after toymaker VTech acknowledged suffering a data breach that affects 5 million accounts and personal information and photographs relating to more than 200,000 children.
Advanced security threats are growing every day. And so is the sophistication of cyberattacks, custom malware, drive-by downloads. watering-hole attacks. The list goes on and on. To fight these new threats, organizations are turning to big data security - the process of using data analytics to uncover the hidden...
Fighting malware today requires more than point-in-time security tools alone.
It takes only one threat to evade detection and compromise your environment.
Furthermore, point-in-time detection provides no insight into the scope of a breach
after it has happened, leaving you blind and unsure of how to respond and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.