The old security model is broken, and now is the time to introduce a whole new approach to threat detection and response. This is the message from Dave DeWalt and Kevin Mandia of FireEye.
Artificial intelligence can be used to enhance security across a number of business sectors, including retail and financial, says Dr. Akli Adjaoute of security firm Brighterion.
Bring-your-own-device concerns are getting more complex, but most organizations aren't keeping up with the times, and their outdated policies and procedures prove it, says John Whaley of Moka5.
Advanced threats and targeted attacks - they're today's most persistent challenges. And no security solution by itself is enough to defend organizations. But combined solutions offer a new defense.
Lawsuits claiming infringements on information security technology patents could become more common as the value of the technology increases in light of the need to prevent breaches, says attorney James Denaro, who leads the intellectual property practice at the CipherLaw Group.
The Department of Homeland Security is offering managed cybersecurity services free of charge as an incentive to get financially strapped local, state and territorial governments to adopt the cybersecurity framework.
RSA 2014 is hosted across the street from a Target store. Which is only fitting because the Target retail breach arose in many discussions during day one of the annual security conference.
Leading today's RSA Conference 2014 industry news roundup, Citrix partners with CA Technologies, while WinMagic introduced an encrypted data management solution.
Target Corp. confirms that the December breach that affected 40 million credit and debit cards, along with personal information on up to 70 million customers, had a major impact on the company's earnings in the fourth quarter of 2013.
The gateway security solutions provider iBoss Network Security is enhancing its offerings by incorporating analysis of behavioral movement of traffic in and out of the network.
While most organizations are focusing on compliance, they are ignoring basic human-factor security risks that technology cannot fix, says Hord Tipton, executive director of the International Systems Security Certification Consortium, better known as (ISC)².
Among the biggest cyberthreats enterprises face comes from hacks on consumer mobile devices, says Caleb Barlow, a director of product management at IBM Security.
Too many businesses are worried about how security might adversely affect the user experience, even among their own workforce, says Bert Rankin, chief marketing officer of ThreatMetrix.
While January's seemingly isolated distributed-denial-of-service attacks against JPMorgan Chase and Bank of America may have been a blip, DDoS expert Barrett Lyon says stronger attacks are on the way.
While massive DDoS attacks were dominant in 2013, this year, smaller application-layer attacks going after such things as log-in pages and password files are far more common, says Rich Bolstridge, chief strategist, financial services, at Akamai Technologies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.