Mention endpoint security to an infosec professional and he or she will likely think of antivirus software, vulnerability scanning, and patch management. These three areas have made up the essence of endpoint security since organizations first connected to the Internet. Antivirus software, vulnerability scanning, and...
Los Angeles World Airports (LAWA) is the airport oversight and operations department for the city of Los Angeles, California and is headquartered on the grounds of Los Angeles International Airport. Bob Cheong, CISO of LA World Airports, discusses Achieving Control and Visibility with RSA Security Analytics, ECAT...
Managed Security Service Providers (MSSPs) help protect an organization's critical data to avoid data breaches. Choosing an MSSP is an important decision that requires a careful, thorough assessment of the options. MSSPs provide fully managed security services, not just security technology. Evaluating the three key...
The past year has brought new meaning to the term 'hack.' Pervasive malware and advanced threats have reached unprecedented levels, with some estimates as high as 500 million financial records impacted in 2014. In this white paper, we look beyond the headlines and focus on the root causes of the high profile target...
Global eCommerce sales are predicted to reach $1.5 trillion in 2014 and are further predicted to grow by a meteoric 57% by 2017, according to eMarketer. A downside of this explosive growth is the increased opportunity for online fraud.
Building smarter rules around fraud detection and automating the process is proven...
Going by the number of headlines about data breaches, it appears the bad guys always seem to be one step ahead, skillfully customizing
malware and social engineering to get past our best defenses and evade detection. The problem is when it comes to advanced attacks, security teams can't see the forest of trees - too...
Spear phishing is a primary means by which APTs target and infiltrate networks. This e-book explores the various elements of these types of attacks, such as:
The characteristics of phishing emails;
How spear phishing and APTs are related;
How to protect against them and keep your organization safe from advanced...
In less than three years, the DMARC standard has reshaped the email fraud landscape, disrupted longstanding phishing strategies, and forced cybercriminals to abandon preferred targets. Today, DMARC is still the best remedy in the fight against phishing and spoofing. As its implementation continues to spread outward...
From the information provided in interviews, Forrester has constructed a Total Economic Impact (TEI) framework for those organizations considering implementing IBM Datacap. The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision, to help...
Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can't expect to adequately protect data if they don't have knowledge about what data exists, where it resides, its value to the organization, and who can use...
The outcome of any big data analytics project, however, is only as good as the quality of the data being used. As big data analytics solutions have matured and as organizations have developed greater expertise with big data technologies he quality and trustworthiness of the data sources themselves are emerging as key...
This infographic highlights key actions to take in order to align the "keep everything" needs of Big Data with the "defensible disposal" mandates of Information Governance.
Download this infographic to learn:
The keys to the analytics machine;
How to organize and devise a manageable solution.
With a spate of recent breaches taking place at well-known companies including Target, Home Depot and Sony, organizations must reevaluate the security of the code running within the enterprise. Leaving flawed code in place almost invites hackers in to the company's network. Why has application security not kept pace...
Advanced threats and targeted attacks have clearly proven their ability to penetrate standard security defenses and remain undetected for months while siphoning valuable data or carrying out destructive actions. According to a 2014 Ponemon Institute study, the average cost of just a single targeted attack on a large...
Welcome to the golden age of hacking. This is the reality that businesses operate in today. An amalgamation of legacy and new technology systems and processes, traditional approaches to information security, and explosion of growth in data collection is pushing enterprises to a breaking point. Hardly a week goes by...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.