With the rapid increase of PCs, tablets, and other devices in the enterprise environment, it's critical to ensure that sensitive data is secure, and one of the best ways to achieve that end is encryption. Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both...
Mobile data protection solutions defend access to secure data on storage systems in notebooks, removable media, desktops, servers and cloud storage environments. Buyers seek data protection policy enforcement across multiple platforms, minimal support costs and proof of protection.
Download this white paper to...
Enterprise DLP continues evolving to support both content-aware and context-aware capabilities, as well as support for IT security leaders to cover broader deployment use cases beyond regulatory compliance and intellectual property protection.
Download this white paper to explore
Various vendor strengths and...
Qatar National Bank has suffered a massive breach involving 1.4 GB of sensitive internal files being dumped online by unknown attackers. Experts say customers' records, access credentials and payment card data have been exposed.
The U.S. government is actively disrupting - rather than just monitoring - computer systems, networks and communications technologies used by the jihadi fighters known as ISIS, ISIL or Daesh, according to a news report.
Like last year's breach of the online dating site Ashley Madison - tagline: "Life is Short. Have an Affair." - this year's release of the "Panama Papers" is holding individuals accountable for actions which, if not always illegal, in many cases appear to have at least been unethical.
Prosecutors have expanded a complex case, involving an alleged pump-and-dump stock scheme, hacking into U.S. banks and operating an unlicensed bitcoin exchange, to include money-laundering charges related to processing bitcoin ransoms paid by ransomware victims.
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the...
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. However, the adoption of a new operating system can also be a period of increased security vulnerability particularly if the IT department doesn't have the tools, technologies and processes...
Two of the hacker masterminds behind the notorious SpyEye malware have each received lengthy prison sentences after pleading guilty to related charges in U.S. federal court. But alleged Zeus creator and accomplice Evginy Bogachev remains at large.
Epic Systems' successful lawsuit against India's Tata Consultancy Services raises many security questions. For example, why did Epic find out about the allegedly inappropriate downloading of trade secrets from an external whistleblower, rather than as a result of internal detection efforts?
An effective way for attackers to appear legitimate in face of security solutions is by exploiting logic
flaws in the functionality of existing systems. These logic flaws are what we
call design vulnerabilities.
With design vulnerabilities, the threat actor exploits a feature of a given product. It's not that...
What could be worse than a ransomware infection? How about getting infected by "torture ransomware" that uses a sadistic puppet to taunt you, slowly deleting your encrypted files while increasing the ransom demand until you pay?
Today's cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats.
Download this white paper to explore:...
i2 Enterprise Insight Analysis helps the analyst see the forest through the trees. Analysts' using i2 EIA will discover that these events are all related. All the anomalies are connected to DHCP servers initially infected by malware. The new specialty of cyber threat analysis, also referred to as cyber analysis, is...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.