U.S. officials have confirmed the existence of a new leaker exposing national security documents, CNN reports. The leak apparently involves documents prepared by the National Counterterrorism Center.
Cybersecurity researchers at the Georgia Tech Research Institute are developing a tool known as BlackForest that amasses information from the Internet to give organizations an early warning of a pending cyber-attack.
Detecting and preventing advanced attacks isn't just a technology issue - it's a business risk that needs to be elevated to the highest levels of an organization. Trend Micro's Tom Kellermann shares strategies.
Peruse the agenda for the Black Hat security conference that's being held this week in Las Vegas and you'll get a peek at some of the major cybersecurity challenges ahead - and potential solutions.
Organizations can substantially benefit by having a process in place for the use and management of administrative privileges.
Read this white paper for tips on:
Developing and enforcing policies for privileged accounts;
Minimizing the use of shared administrative accounts;
Verifying the privileges...
Effectively managing privileged accounts has become critical as security and compliance emerge as the driving forces behind most IT initiatives. Unfortunately, native tools and manual practices for privileged account management are inadequate for today's complex heterogeneous enterprise.
Explore this white paper...
Foreign espionage was a primary concern for a security team in the nuclear energy sector that needed to protect intellectual property and trade secrets from dedicated attackers. They needed a solution that would provide real time visibility at the network and endpoint layers, and detect previously unknown threats, as...
Financial institutions feel the pain of recent retail breaches, and they seek new ways to secure payments and fight fraud. But how can security leaders influence changes within their own organizations?
The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it is the science - and the art - of defending yourself against sophisticated, persistent adversaries who can get past (or have already...
All too often network security professionals are forced into an escalating workflow-an arms race remediating alerts (indicators of attacks) as they come in, instead of proactively hunting for the adversary-who is likely already in your network. Resource and time constraints, as well as a lack of visibility and the...
Most organizations spend a lot of time and effort in choosing a DDoS mitigation solution, however often they don't provide the same level of diligence in testing their defenses. You'll want to test your options in your real world environment and there are many ways to do that ranging from free options to dedicated...
A low-tech campaign combines phishing, small-footprint attack code and Android malware to topple banks' security defenses in Switzerland and three other nations. Will the campaign extend to U.S., U.K., and beyond?
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries' motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive...
Distributed Denial of Service (DDoS) attacks are some of the oldest Internet threats and continue to be the top risk to networks around the world.
As protections have evolved, the technology used by hackers has adapted and has become much more sophisticated. New attack types now target applications and services,...
In 2013, IDC saw a sharp increase in distributed denial-of-service (DDoS) attacks in terms of frequency, bandwidth volume, and application orientation. With attacks on the rise, organizations need to be aware of, and protect their infrastructure from, the advanced methods used by today's DDoS attackers.
According...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.