As technology evolves, more and more organizations are moving applications and data to the cloud. Although cloud solutions can save money and improve accessibility for remote users, it can also leave your sensitive data vulnerable to new security threats. With the lack of governance policies and security practices for...
According to the 2014 Verizon Data Breach Investigations Report there were 63,437 reported security incidents and 1,367 confirmed data breaches in 2013. These statistics summarize today's reality in IT security: security is consuming a larger share of total IT spending, but security effectiveness against the...
To gain a picture of how organizations are contending with changing technology and security, SafeNet undertook an extensive survey. The findings offer insights into current market realities, and their implications for security executives.
This survey discusses:
If faith in the perimeter still exists;
How...
The globalization of fraud waged by organized crime has spurred new cross-channel attacks and is affecting how ATM operators approach data security, executives from three of the world's leading ATM manufacturers explain in this exclusive interview.
Following the Paris terror attacks, the French government plans to strengthen its surveillance laws, while the British prime minister has promised to allow intelligence agencies to penetrate any encrypted communications.
Cyber insecurity is the leading threat to growth in the banking industry. But as demonstrated by recent major breaches, merely following
regulatory rules will never keep pace with the constantly growing and changing cyber threats.
Download this white paper to learn:
How to stop advanced threats.
Protect...
The identity federation standard, Security Assertion Markup Language, or SAML, enables single sign-on (SSO) and has a wide variety of uses for businesses, government agencies, non-profit organizations and service providers. With the wealth of internal and external web applications and services, federated identity is...
The sheer volume of data moving between agencies, contractors and citizens to support collaboration is staggering and impressive. Moving and keeping this data safe becomes a top priority, especially with the growing number of computers, devices, systems and applications. Agencies must determine how to handle multiple...
Your employees, from the C-suite to entry level, hit 'Send' hundreds of times every day. It's so easy to click that seemingly innocent send button that-in the moment-you may not realize the risk.
Thanks to the Snowden revelations and a never-ending cycle of breach news, we are now far more aware of the risk. Now...
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
How will EMV and contactless payments reduce ATM-related card fraud? In part one of this three-part exclusive interview, executives from the world's top three ATM manufacturers discuss how they're helping banking institutions address emerging fraud trends.
We recommend this analyst report for anyone evaluating enterprise mobility management (EMM) solutions or looking to gain a better understanding of the market.
Download this report for leading industry insight and to learn:
Key trends that have been identified;
The benefits of an effective EMM...
Want to protect your hard earned email reputation and brand from phishers and spoofers? Not sure where to start or do you find DMARC implementation confusing and time consuming? The Getting Started with DMARC guide will tell you everything you need to know about DMARC and how to quickly get up and running....
French authorities continue to investigate the Jan. 7 attack in Paris that claimed the lives of a dozen, including journalists and police officers. Information security experts say that cyber-forensic skills are crucial for finding the perpetrators.
Community banks are a frequent target for attacks by cyber criminals determined to gain access to valuable customer information. The traditional approach to stopping these attacks is to create a defense-in-depth strategy consisting of multiple layers of security technologies. But the headlines we see each week...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.