As breaches continue to cause significant damage to organizations, security consciousness is shifting from traditional perimeter defense to a holistic understanding
of what is causing the damage and where organizations are exposed. Although many attacks are from an external source, attacks from within often cause the...
A recent survey asked information security decision-makers from various industries globally what keeps them up at night and insider threats were high on the list for the 345 pros polled. Protection from imposters requires rapid and reliable detection that offers immediate insight into what's happening, how it's...
This White Paper will present some common sense suggestions for improving the "beginning of the lifecycle" risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, we'll look at how to tie the efforts made at the beginning of the lifecycle to...
Insider data exfiltration causes tremendous damage every year. Worse, the vast majority of insider data exfiltration goes undetected simply because the organization is not looking for it. Relying on technologies designed primarily to secure the perimeter leaves much to be desired. Relying on trust is only an option...
How prepared is your health care organization to respond to an attack, and what resources - in-house and outsourced - are used to defend valuable protected health information?
Register for this informative webinar to learn how health care organizations are combating data breaches.
A quiet life in retirement? Not for Art Coviello, former executive chairman of RSA. He's just joined the boards of two new security ventures, Bugcrowd and Cylance, and he's got big ideas for how to influence the 2016 cybersecurity agenda.
Much of the currently used statistical-based fraud detection methodology is creating significant challenges for both organizations and end users. These statistical models generate high false positive rates and provide a risk score that does not effectively distinguish between legitimate and malicious activity.
With...
Today's cybercriminals are aware of the fraud prevention technologies deployed by most financial institutions, and they design attacks to circumvent these controls. Transaction anomaly detection and device ID approaches can be highly inaccurate, generating a large number of false positive alerts that can overwhelm IT...
You're not alone. Balancing the need to mitigate TCPA compliance risk while balancing operational efficiency and growing revenues is a real challenge.
See what strategies your peers are implementing in this new whitepaper: Where Efficiency Meets Compliance: Using Data to Drive Revenues and Reduce TCPA Risk.
In...
Most fraud involves the use of false or anonymous identities. Banks are fighting back with tools and solutions designed to verify identity or at least raise red flags before fraud occurs. Neustar sponsored a survey with American Banker of over 230 top senior financial executives, within fraud mitigation and risk...
The Q2 2015 State of the
Internet-Security Report builds on the significant changes
made in last quarter's report. In this edition, attack data
previously published in the classic State of the Internet
Report is combined with the data previously published in the quarterly
Prolexic DDoS Attack Report. The two...
LifeLock says it has reached a tentative agreement on a settlement with the FTC regarding alleged information security shortcomings and other issues. It says it's also reached agreement on a proposed settlement of a related consumer class action lawsuit. The stock market reacted favorably to the announcements.
Recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-factor authentication, device ID systems, risk engines and behavioral analytic systems. Banking malware such as Citadel, Zeus, Dyre and Bugat, incorporate advanced...
Cisco plans to acquire network security vendor Lancope, its latest in a series of acquisitions of companies specializing in information security. Learn why analysts say the deal makes sense.
To stop threats, you first have to see them coming.
Today's cyber threats are increasing in volume, diversity and sophistication, rapidly outstripping the ability of point security solutions to safeguard critical data, applications and systems. Network-based security replaces these vulnerable point solutions with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.