The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security.
In this latest whitepaper from Kaspersky Lab, you'll find useful facts, examples and business case...
When asked to describe the current cyber threat landscape, one of the more balanced and objective answers might be that threats are "hiding in plain sight." Today's advanced cyber threats use applications as their infiltration vector, exhibit application-like evasion tactics, and act as, or
use common network...
Moving to Amazon Web Services (AWS) can offload significant IT resource and cost burdens. However, you can't offload the ultimate responsibility for the security, privacy, and compliance of your data.
This whitepaper delves into an approach to migrate sensitive data into AWS environments while ensuring...
As threats evolve and the effectiveness of signature-based web security declines, IT departments need to play a bigger, more hands-on role in web security than ever before. To combat today's cybercriminals, IT managers need to gain insight into advanced threats and improve their responsiveness to the threats that most...
Criminals and terrorists use sophisticated techniques to hide their true location, and many banks or other businesses become victims of such location spoofing - thus violating OFAC regulations that prohibit business transactions with specific countries, entities, or individuals.
To be compliant with OFAC...
It seems every vendor is marketing a solution to challenges posed by Advanced Persistent Threats and Targeted Attacks as Data Breaches stemming from sophisticated cyber threats routinely making the news. Sandboxing, payload analysis, emulation "fire" this and "fire" that whatever you call them, solutions to detect...
NSS Labs released their new methodology in 2014 for Data Center Firewall testing.
In contrast to historic Network Firewall evaluations, vendors are subject to heavier Data Center core network traffic, including a higher minimum firewall threshold of at least 40 Gbps throughput, high volumes of server-to-server...
APT attacks have led to highly visible security breaches at Target and other well-known organizations. This whitepaper explores three approaches for combating the critical APT lifecycle stages - protect, detect and remediate. The whitepaper also highlights how multi-tenant cloud solutions are better equipped than...
Enterprises rely on powerful arrays of firewalls and secure gateways to keep attackers at bay. But for this security model to work, every user must access the Internet through a protected, centralized pathway. As employees increasingly access the web through a multitude of insecure channels, it's time for a change of...
Enterprise CIOs and CISOs are asking: what does the cloud mean to enterprise security? In today's Everywhere Enterprise, mobile devices outnumber PCs, users are accessing applications and storing data in the cloud, and streaming media and social media are stretching the limits of corporate bandwidth and compliance....
Software-defined security (SDSec) is an architectural approach that allows security and compliance requirements to keep pace with the dynamics of software-defined data centers, private clouds, public IaaS, hybrid, and multi-cloud combinations. Based on five principles, SDSec provides security orchestration and...
The notion that cloud technologies should not be used by large enterprises due to security concerns is rapidly fading. Security still ranks as the No. 1 impediment to full-scale cloud adoption, but cloud service providers (CSPs) are quickly responding to these concerns. This report is a first look at the types of...
Combating digital fraud has become a business issue and presents risk for any organization with online operations. Gain perspective from CIOs on what organizations can do to prevent fraud in digital commerce by reading this white paper.
Mobile banking apps continue to gain in popularity, and the time has come to refine the mobile banking experience. This includes addressing the security concerns of banking customers who remain fearful of using those apps, despite their convenience. Whether you are tasked with network security, fraud management, or...
ISMG, in cooperation with the International Cyber Security Protection Alliance (www.icspa.org), is carrying out research to determine the primary types of financial fraud targeted at UK businesses and citizens and where the biggest security gaps are.
The ICSPA is in turn working with the City of London Police and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.