The specter and cost of the recent high profile data theft cases has had a chilling effect -and it's just the beginning of a long-term trend. The lure of easy and substantial financial gain as well as the explosion in the number of threat actors all but guarantees that this costly trend will continue. Potentially...
In the Oil and Gas industry, there is no single adversary and no single threat to the information technology (IT) and operational technology (OT) infrastructures. Attackers run the gamut from hacktivists and cybercriminals to terrorists and state-sponsored hackers, each with their own skillsets and motives.
An...
If every VDI instance is running a full anti-malware agent, rather than being centralized and deduplicating into a single agent on a dedicated virtual appliance, there will be a measurable performance impact that immediately puts the viability of VDI projects in jeopardy. This paper outlines how the impact of...
As virtualization projects continue to accelerate, organizations are discovering they have changed how datacenters are architected, built, and managed. With this evolution, there are areas of security concern organizations must address as they move, ever-increasingly, to rely on virtualization. It is important to...
In evaluating current or future BYOD policies and deployments, it's important to recognize that your industry
regulations, employee needs and company culture should play a significant role in determining how your
company enables BYOD. One approach does not suit all companies. Even within a company, you may...
Virtualization offers remarkable benefits to organizations. However, organizations that are aggressively pursuing virtualization are not realizing the full possible return on investments in virtualization. However, too often, organizations don't consider the need to identify new endpoint antimalware solutions. ...
Not all email encryption solutions are created equal. Some can compromise ease-of-use and
force users-both your employees sending encrypted email and your customers and partners
receiving encrypted email-to jump through hoops. What once was a fast communication tool
can become a frustrating barrier to business. The...
Bad news about APT: Attacks are bigger, faster and aimed at a wider variety of targets. How must organizations win board support to improve their defenses? Lockheed Martin's Justin Lachesky shares insight.
IBM's Etay Maor
LIVE Webinar: Led by IBM's Senior Cyber Security Strategist, Etay Maor
Today everything is for Sale - anyone (amateur or professional hacker) can access or purchase a wide range of tools enabling them to leverage the latest application vulnerabilities to target their victims.
A Latvian hacker's guilty plea for the role he played in enhancing the Gozi Trojan, and reports of other new malware-related arrests, are promising developments in the international fight against cybercrime. Security experts, including Gartner's Avivah Litan, weigh in on the long-term impact.
The gang behind the Carbanak banking malware - tied to $1 billion in fraud - has changed tactics, using upgraded malware via spear-phishing attacks, a security expert warns. Separately, a new banking Trojan called Shifu has been targeting Japanese banking customers.
Even if they know their companies' current security solution isn't effective, many IT managers are under the false impression that it's simply too complicated, costly and time consuming to make a change. Did you know it can be more complicated, costly and time consuming to stick with your existing, sub-par...
The most recent HP Security Cyber Risk Report revealed that vulnerabilities in production software are still pervasive. Finding software vulnerabilities is only part of the battle; actually fixing those vulnerabilities can sometimes be an elusive goal, especially when you lack access to the code. Using Runtime...
Applications are a primary target for cyber attacks. Historically, Web Application Firewalls (WAFs) have been a popular choice for protecting production applications from attack. But they have their limitations, and advice on how to bypass a WAF is readily available. Learn how context from within the application...
Four years after the FFIEC issued its updated authentication guidance, many banking institutions say account takeover losses have gone up, a new survey shows. John LaCour of PhishLabs explains why institutions' reactive approach to fraud is failing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.