Financial malware - that is, malicious software designed to enable fraudulent transactions - is a growing concern for line-of-business executives, heads of retail and commercial banking, leaders of global compliance operations, and risk management officers worldwide. Fraudsters rely upon increasingly sophisticated...
In today's ever changing fraud landscape, much of the currently used statistical-based fraud detection methodology is creating significant challenges for both organizations and end users. These statistical models generate high false positive rates and provide a risk score that does not effectively distinguish...
Mobile banking continues to gain momentum, growing faster than any other banking delivery channel to date. Many financial institutions contemplate expanding capabilities in the mobile channel, but they are concerned about security.
Fortunately, new security measures are available to mitigate the risks associated...
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? In the view of Enterprise Management Associates (EMA) analysts, the term has become marginalized by technologies that pigeonhole capability into silos of...
Today's IT organizations are under more pressure than ever. As technology innovation and adoption increases, much of that pressure is centered around the conflict among three primary sources:
The hyper-empowered user who demands access to data anywhere, at any time, from any device;
The rich and vibrant diversity...
There is no fail-safe in today' s digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all...
Ponemon Institute surveyed 640 individuals involved in the application development and security process in their organizations on the following topics:
Why mobile application security eludes many organizations;
The difficulty in controlling employees' risky behaviors;
Are organizations taking the right steps to...
It's not easy being today's CIO. As employees bring growing numbers of their own computing devices to work, CIOs are faced with a tough choice. They must either figure out a secure way to allow employees to conduct business on their own devices - no easy job - or they must simply say no.
Download this white paper...
A growing number of companies rely on web-based applications to provide online services to their employees, to support e-commerce sales, and to leverage portals, discussion boards and blogs that help staff communicate more effectively with customers, partners and suppliers. However, as the number and complexity of web...
Just when you thought it was safe to go mobile, everything is different.
The risks are different. Only a few years ago, predictions stated that smartphones and tablets had little vulnerability to malware and hacking. But in the one-year period ending March 2013, malware aimed at mobile platforms grew 614 percent,...
There are many reasons why organizations like yours should be critically concerned with application security. Applications are becoming increasingly pervasive as organizations grow and implement more powerful software to support business processes, product development and daily operations. In addition, the way...
Threats today aren't your parents' malware. They aren't, for that matter, even the malware you encountered yourself just a few years ago. The fact is that, while malware protection has long been a basic IT security function, many organizations still struggle to stay safe. The double whammy of rapid malware...
Corporate credentials. They're the keys to your enterprise and more than likely you've taken many steps to protect them.
However, what many CISOs and security managers are finding is that traditional approaches to preventing credentials theft - from implementing stringent identity management policies to deploying...
The ability to capture, consume and correlate multifaceted data from all over the enterprise is a growing need. No single data source or type can provide sufficient forensic capabilities to solve all of today's security problems. Log information from network and server infrastructure is no longer sufficient to...
Change is hard, and the security industry faces a distinct lack of control in a number of areas, which is enough to cause panic attacks. In terms of access, IT can no longer rely on ownership of or control over devices. Consumption occurs on user-owned devices everywhere - often not even through corporate-controlled...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.