As national security and defense threats become more asymmetrical and complex, intelligence organizations and agencies are challenged to respond more efficiently and precisely. With shrinking budgets and limited resources, these agencies need a solution that can help them accelerate the data-to-decision process, so...
FireEye has issued an emergency security alert - and related patch - to fix a serious flaw discovered by Google researchers. The episode follows FireEye earlier this year being criticized for serving an injunction against other security researchers.
The Onion Router (Tor) - an open source software- uses a concept called onion routing, which ensures the entry node
to a network is not the same as the exit node. This process creates anonymity for
the client when interacting with the destination system. By hopping among internal
nodes, it could theoretically be...
Historically, innovation within the financial services industry has moved at a glacial pace. A combination of factors limited institutions such as compliance obligations, dependence on complicated infrastructure, and a riskaverse approach to security. An environment was created where innovation was perceived as risky...
Digital transformation offers financial institutions the
potential to reinvent themselves and meet
heightened customer expectations. Those that
embrace digitization as not simply a defensive
strategy against bank and non-bank competitors,
but as a way to increase revenue through improved
consumer insights and...
Twitter has issued its first-ever alerts to some users that they may have been "targeted by state-sponsored actors." Some cryptographers, software developers and security experts say they have received the alerts.
Check fraud - it not only won't go away, but it is morphing to keep pace with consumers' digital banking habits. David Barnhardt of Early Warning talks about this persistent fraud threat and how banking institutions should respond to it.
Security experts are warning that Internet-connected devices - including toys - should be treated as insecure and untrusted until proven otherwise. Have our collective information security shortcomings ever been more seasonally appropriate - or scarier?
Healthcare is the new battleground, and the personal patient data that hospitals have readily available is more lucrative, more
comprehensive, and more attractive than retail and banking data ever was. Violations of patient privacy leave healthcare organizations vulnerable. Unfortunately, it's not a question of if...
The two biggest culprits driving security alert volume for healthcare organizations are web-based attacks and malicious insiders. But
since most hospitals cannot hire dozens of investigators to examine each and every one of these alerts, what can be done?
Download this white paper to explore
The three main...
Two new malware reports - one from security researchers at technology giant Cisco, another from cybersecurity firm FireEye - demonstrate how developers continue to refine malicious code to maximize information-stealing and extortion potential.
He'd spent nearly 15 years in information security, then realized we needed to change our fundamental approach. Why did Art Gilliland, CEO of Skyport Systems, bet his career on this notion? And how is it paying off?
Today's security threats may be considered "advanced" by some, but ThreatSTOP founder and CEO Tom Byrnes believes many organizations are living in the medieval times of cybersecurity. How can they avoid slipping into the Dark Ages?
Files may be secure within a network using perimeter-based solutions. They may even remain secure during transit using encryption technologies. But what happens once recipients obtain and decrypt those files? How do you keep information secure as the file gets passed around or downloaded onto a flash drive? How can...
Hundreds of millions of PCs are at risk of being remotely exploited, after a security researcher released proof-of-concept exploit code for separate, newly discovered flaws in software preinstalled on systems by Dell, Lenovo and Toshiba.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.