Ian Glover, president of the UK's Council of Registered Ethical Security Testers, has a message for individuals who want to enter the security testing profession today: No hackers allowed, thank you.
Philip Reitinger, the top cybersecurity official in the Department of Homeland Security, is on a mission to help create a new, secure computing ecosystem on the Internet.
When the business demands the latest tools and technologies, saying "no" is not a viable option. "Clearly, these are disruptive things, but they also are extremely valuable," says Simon Godfrey, Director, Security Solutions at CA Technologies UK.
In today's world, where certain data must be let in so governments and businesses can realize their missions, firewalls must be able to see the content flowing through networks, NIST Computer Scientists Tim Grance and Murugiah Souppaya say.
Think your data is secure? Think again.
If you are sending data over a service provider's network, then you need to know: Current Wide Area Network (WAN) technologies offer no inherent data protection. It's time for you to take matters into your own hands to ensure your data is secure.
View this FREE webinar to...
Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
Mini-documentary takes you inside the U.S. Cyber Challenge security treasure hunt, where competitors hack deep into a target information system to capture flags in a contest that combines skills and wit.
When it comes to banking malware, there are two threats: The actual software that is growing in sophistication and stealth, and then the level of awareness among banking employees and customers alike.
Organized crime was responsible for 85 percent of all stolen data in 2009. And stolen credentials were the most common way to gain unauthorized access into organizations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.