The security industry has thousands of researchers looking for vulnerabilities in the software you use - HP Security Research alone has more than 3000. But how do you apply the security intelligence they develop to the job of protecting your network?
The Activate "Network Security Intelligence Selection Buying...
As the U.S. completes its payments migration to the EMV chip, merchants and card issuers should be bracing for an uptick in card-not-present fraud, says Carol Alexander, head of payment security at software provider CA Technologies.
SIEM systems were orginally intended for compliance and log management. Later they were used to detect and investigate attacks. However, log-centric SIEMs have several flaws that make it difficult to detect successful attacks and even more difficult to investigate them. Log-centric SIEMs give security personnel some...
(ISC)² and the Cloud Security Alliance have unveiled a new cloud security professional certification designed to measure advanced competence. Will training for the certification help professionals gain a better understanding of cloud security?
This e-book contains insights on breach readiness, response and resiliency based on in-depth interviews conducted with the Security for Business Innovation Council. Readiness benchmarks for the industry at-large are drawn from a global survey of 170 security practitioners in 30 countries. Measures within four major...
If you are reading this paper your most pressing concern undoubtedly is protecting your organization's intellectual property and sensitive customer data. Highly visible breaches and attacks have brought an intense focus on organizations' incident detection, investigation and mitigation capabilities. After all, if you...
Miercom, a leading security testing firm, recently performed a head to head security efficacy analysis of network-based breach detection and Advanced Persistent Threat (APT) prevention solutions that utilize sandboxing. Zscaler Internet Security and FireEye Web MPS 1310 were tested, and Miercom found the Zscaler...
In conducting due diligence, investors spend more time than ever assessing the cyber-risk posed by the company targeted for acquisition, says Jacob Olcott, VP for business development at Bitsight Technologies.
Protecting against advanced cyber-attacks requires, among other things, that you meet the same level of sophistication as your attackers. Unfortunately, most current security technologies fail to meet that bar, resulting in organizations being breached when they thought they were protected.
A resulting breach can be...
Customers are embracing new technologies and their expectations are changing rapidly in today's connected world. They want to interact through a variety of applications, at any time and from any device. Banks, retailers and many other consumer facing organizations are racing to enable new interaction channels to...
The rapid proliferation of mobile devices has created additional security requirements for any organization attempting to increase its presence in the online market. And because smartphones and tablets afford end users a variety of new ways to interact with the enterprise, IT needs to evolve the security measures...
With customer loyalty at stake and competitive pressures on the rise, more and more businesses are increasing their mobile apps budgets and development efforts. By doing so, they hope to not only improve their ability to engage with customers, but also reap the benefit of a lower-cost business model. The...
Year after year, cyber threats continue to increase in both sophistication and frequency. One reason that data breaches are occurring is that passwords are created by people to identify themselves for multiple applications - from online banking accounts to a shopping site - and these passwords are valuable to...
It seems like every day we see in the news that another breach has occurred. In fact, the New York Times recently reported on a security breach that involved over a billion online account passwords. Why does this keep happening? One reason is that many websites continue to use simple passwords for authentication and...
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won't abandon their transaction while at the same time stopping illegitimate attempts to transact.
The...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.