In 2015, there were nine common web application attack vectors. They
represent a cross section of many of the most common categories seen in industry
vulnerability lists. The goal of this report is not to validate any one of the vulnerability
lists, but instead to look at some of the characteristics of these...
Security requirements are still stalling the broader adoption of cloud applications. Organizations need to be able to see, control and monitor cloud application usage to help protect against cloud-delivered threats, policy violations and risky user behavior. One of the key challenges is that on-premises security...
Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as a direct driver of business continuity and bottom-line growth. This shift in perception has begun to have a dramatic impact on the position and role of security...
If your organization has intellectual property, customer data, or critical systems that are valuable, your employees are being targeted with spear phishing emails. To help security leaders strategically manage their defensive posture, we have created a four-phase framework that
spans relevant security layers from the...
In 2013, Apple introduced Touch ID, a biometric technology that brought convenient fingerprint recognition to a mass consumer
audience. Banks have gravitated to Touch ID
because it provides them with a device-based technology
they may leverage to secure the mobile banking platform, and,
in turn reduce their costs...
For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture,...
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud...
Today's security threats may be considered "advanced" by some, but ThreatSTOP founder and CEO Tom Byrnes believes many organizations are living in the medieval times of cybersecurity. How can they avoid slipping into the Dark Ages?
The key, says Byrnes, is to not allow the Internet to be home to organizations that...
Ask any cyber-security professional and they'll tell you that it's getting more difficult to prevent, detect, or respond to cyber-attacks, data breaches, and even data exfiltration. Why? The threat landscape continues to grow more dangerous while IT infrastructure becomes more complex with the addition of mobile...
Whatever your favorite metaphor may be - mountain, tsunami, landslide, or avalanche - it's an inarguable fact that we live in a world that is creating and storing more data than most of us can imagine. From presentations and emails, to videos and photos, to documents of every type, we create 2.5 exabytes of data every...
Unstructured data may be the world's best-kept secret. Companies have been slow
to recognize that valuable information lies within the documents, emails, and social streams
that are being constantly created. The value of structured data continues to grow, of course -
but the new battleground for competitive...
When desktops ruled the enterprise, employers may not have claimed to have absolute control over their workers' usage of technology and
data. But they surely could contain it. Today, this seems like something from a far-away age, even though it was accepted as reality just a decade ago.
Download this white...
Whether employees are negligent or malicious, IT security teams (and ultimately, CISOs) are responsible for protecting the organization
from breaches and risky behavior. But outdated, traditional security solutions don't offer enough protection from threats inside organizations. Security professionals need a new...
The launch of email, the expansion of networking and data sharing, along with the introduction of the domain name system, has created technological, innovative opportunities for individuals, businesses, and governments worldwide. However, these opportunities also presented themselves to threat actors - criminals...
In terms of malware, 2015 will go down as the year that ransomware got big, and the organized criminals behind it got bolder. IBM's Limor Kessem discusses what to expect from advanced malware variants in 2016.
A senior cybersecurity evangelist at IBM Security, Kessem says she sees a significant new sophistication...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.