JPMorgan Chase in September confirmed that it was the victim of a cyber-attack that compromised customer information. This infographic provides an overview of what we know so far and what questions remain unanswered.
The IT world is on the precipice of enormous change. While full adoption of this change will not happen overnight, it has already begun to happen in the datacenter and for a user near you. Because of the substantial investments made by organizations in building out their datacenters, and thanks to the significant risk...
The security benefits of log and machine data analysis are widely accepted by CISOs and CIOs, and yet too many organizations have difficulty executing on this opportunity due to bottlenecks imposed by archaic systems and processes that manage this data. Without the right tools to give easy visibility into the data,...
The debate between leading retail and banking associations over accountability for card fraud has heated up in recent weeks. One retail group now says claims about merchant security and fraud liability have been misstated.
Enterprises are increasingly adopting Linux as a secure, reliable, and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions.
In particular, the Red Hat Enterprise Linux (RHEL) operating environment, which is...
Datacenters are, and always have been, investments that evolve as the industry changes, new technologies emerge, and application needs change. However, today, datacenter managers are facing a daunting future that may not include any meaningful expansion of their datacenters in terms of floor space, yet their existing...
Hackers launched a successful phishing attack against Fidelity National Financial employees, then used the stolen information to attempt to reroute money transfers, the title insurance and mortgage services firm warns.
In this post-Target era of "It's not a matter of if, but when," how prepared is your organization for a data breach? Michael Buratowski of General Dynamics Fidelis Cybersecurity Solutions offers tips for breach planning and response.
An important lesson from the breach of a White House unclassified network is that organizations should invest in intrusion detection tools, not just perimeter defenses, SANS's Johannes Ullrich says.
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a...
Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet." These are wise words of warning for businesses counting on so-called "free" IT security software.
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting...
In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage. The financial losses and, worse, often irreparable reputational harm such incidents wreak have served to place a target squarely on the backs of board members to ensure they...
Technologies implemented to meet operational needs bring tangible benefits to an organization with focused, tactical functions. These tools bring value to organizations due to the focus on the specific business challenge at hand and most often help achieve goals at the operational level. However, certain processes...
The developer of CurrentC, a mobile wallet application, has confirmed a breach at its e-mail provider, which has resulted in the compromise of e-mail addresses for those participating in a pilot program or who requested information about it.
Payment card transactions conducted at the Cape May-Lewes Ferry in Delaware were compromised by malware for almost a year, exposing card numbers and other information.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.