On average, organizations take 229 days to detect a data breach, research shows. Experts offer insights on the key steps to take to speed up the detection of intrusions and minimize the damage.
The U.S. Postal Service on Nov. 10 confirmed a data breach that affected some of its information systems. This infographic offers a timeline of the breach investigation provided by an official during a Congressional hearing.
The director of the National Security Agency, Navy Admiral Michael Rogers, says he expects to see adversaries launch a cyber-attack in the next few years aimed at severely damaging America's critical infrastructure.
Cybersecurity specialists need to learn to think like an adversary in order to develop sound defense strategies, says Greg Shannon, chief scientist at the CERT Division of Carnegie Mellon University's Software Engineering Institute.
Banking systems need to be readily available and productive, yet secure and protected from data-breach. The risks of irregular maintenance and non-compliance of IT and security policies can cost the organization much in terms of fines, lost opportunities and a damaged reputation. With such a serious and complex...
For the first time since its massive data breach in December 2013, Target has reported an increase in its quarterly profits. Find out the details, as well as the latest tally of the retailer's hefty breach expenses.
Two Democratic members of Congress have sent letters to 16 financial institutions seeking information about any data breaches they've experienced and briefings from corporate IT security officers as Congress considers cybersecurity legislation.
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.
Download this white...
Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims, such as finding out their email addresses, job titles and job functions, areas of...
Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and "never touch a running system" is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT...
Recent malware incidents have shown how costly and damaging cyber attacks can be. Such attacks may not necessarily be successful, but when attackers do find their way inside an organization's systems, a swift, well-prepared response can quickly minimize damage and restore systems before significant harm can be caused....
Some regard the security risks that follow the digital revolution as acceptable trade-offs, more cautious ones are left out in the cold. The digital revolution calls for us to stay open to opportunities, and remain alert for threats. Closing oneself off to something good because of latent threats is impractical. All...
PCI DSS compliance is a top concern for many organizations as there are significant effects on business operations, payment card transactions, organizational security and data protection.
Download this white paper to learn:
Exactly how wireless technology has made compliance with PCI DSS more...
Broad adoption of WiFi has created a complex wireless landscape with proliferating mobile devices and applications. It is no longer sufficient to treat all wireless users and applications alike. Threats from social media networks and mobile malware provide a compelling need to deploy and enforce granular WLAN security...
Healthcare providers are migrating from large, independent stand alone organizations into complex new ecosystems. Today Provider Organizations, affiliated physician groups, labs and others are involved in both the provisioning of care, and the collection of vast amounts of information from patients. Health Information...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.