Q1 Labs, an IBM Company, has been positioned in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Leaders typically have...
To determine how well agencies are securing their printing assets, Information Security Media Group and HP launched the 2012 Print Security Survey. This study, aimed at security leaders within U.S. government agencies of all sizes, had a mission to:
Determine the most common types of breaches against printing...
A recent research report describes a so-called new financial fraud scheme dubbed "Operation High Roller". Although there is nothing in this report that was not previously covered in Trusteer's publications (Blog and white paper), the report received substantial press coverage and raised the awareness of the risks...
Many organizations realize they are at risk of insider attacks. But do they have evidence and capabilities to respond to these risks? That's the real challenge, says researcher Larry Ponemon.
"The Risk of Insider Fraud" is the name of new research conducted by Ponemon and Attachmate Luminet, and it sheds new light...
Every organization struggles with the concept of "telework." On one hand, you need to enable employees and contractors to work remotely. Yet, at the same time, IT organizations struggle to find a cost-effective way to securely support these workers.
Download this Osterman Research white paper for detailed cost...
High profile security breaches and the resilience of advanced persistent threats have clearly demonstrated why cyber security concerns have influenced the regulatory legislation governing all industries and why regulations are here to stay. This new white paper discusses the regulatory requirements governing data...
As the growth in mobile devices creates new opportunities for consumers and businesses alike, new threats are emerging. iovation's mobile fraud detection white paper will help you understand the evolving mobile landscape, the business and technical decisions that you may soon have to make regarding fraud risk and how...
As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, reflecting specific risks and markets, these laws share common investigation requirements in...
While we still use many of the same old names - viruses, Trojans, and worms - today's malware deserves much more respect than many are giving it. Where traditional viruses mostly aimed to disrupt operations or win fame for their coders' cleverness, today's malware enables potent multistage attacks called advanced...
This book provides an easy-to-understand introduction to protecting payment card data and a reference framework you can use as you work with architects, operations, analysts and assessors. This book covers not just the PCI DSS mandates themselves but also ways in which you can employ data protection techniques to...
Thales e-Security is pleased to present the 2011 Encryption Trends Study (United States) conducted by the Ponemon Institute. This study reveals how U.S. organizations are using encryption to protect their sensitive data and how the U.S. compares itself with other countries like Germany, United Kingdom, Brazil and...
The increased customer demand for mobile banking services carries increased fraud threats. FIs must wield this combination carefully to avoid fraud losses if they move too quickly or customer churn if they move too slowly.
This white paper highlights:
Current trends in mobile banking;
Fraud threats and...
Internet technology, and especially the virtualization and distributed processing power brought to life through cloud computing, have freed businesses to explore new business opportunities that simply weren't possible to consider just a few years ago. At the same time, however, the complexity and risk associated with...
While threats to network and information security have existed since the dawn of the information age, the complexity and scale of attacks have exploded in recent years, presenting enterprises with daunting challenges as they struggle to defend an increasingly vulnerable perimeter. Unfortunately, traditional perimeter...
U.S. banking institutions have money to spend, but do they know where best to invest it? That's the question begged by the results of the 2012 Faces of Fraud Survey.
Following a year of high-profile fraud incidents, anti-fraud budgets have been fattened. Asked how their fraud resources will change in the coming...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.