As the information security market evolves and cyber-criminals become increasingly sophisticated, capabilities that were once cutting edge become outdated and new functionality is required to keep pace. In this whitepaper Info-Tech Research Group outlines their comprehensive look at the Security Information & Event...
Office 365 represents Microsoft's newest foray (in quite a long line of them) into the cloud-based email and collaboration space. Yet many- if not most- Office 365 customers have found themselves requiring more granular capabilities than are available on the platform.
Read this white paper to learn...
Social media is fast, ubiquitous, and in many cases produces measurable ROI to a business; however, it also poses significant risks that can become public and propagate virally.
This whitepaper defines a clear road map for social media compliance. Learn how to:
Meet regulatory compliance standards regarding social...
Enterprises should test the processes they establish to respond to advanced persistent threat attacks, just as they vet their business continuity plans, ISACA International President Robert Stroud says.
The National Institute of Standards and Technology should use the cryptographic community to help vet the advice it gets from the National Security Agency when creating cryptography guidance, a panel of prominent experts recommends.
Three Chinese nationals seeking to make "big bucks" broke into the computers of Boeing and other military contractors, stealing secrets on transport aircraft, a U.S. criminal complaint says. Read how they allegedly did it.
The Department of Homeland Security confirms that "a potential intrusion" of the Office of Personnel Management's network occurred in March but says officials have not identified any loss of personally identifiable information.
Most organizations that enable users to perform Web transactions (e.g. banks and ecommerce sites) have implemented security controls to address online and mobile fraud. These controls fall into two buckets: transaction-focused intelligence, which looks for anomalous actions, and device-focused intelligence, which...
Criminals have begun targeting ATMs in Western Europe using malware, as well as a new generation of stealthier skimmers designed to capture card data and PIN codes. But the stolen data is often used for fraud elsewhere, especially the U.S.
The idea of a cyber war council, reportedly proposed by a financial services industry trade group, has not received an enthusiastic reception from cybersecurity experts, some of whom question its viability to defend against cyberattacks.
Attorneys for Target have requested a halt in the discovery process for class action lawsuits stemming from the retailer's December 2013 data breach until the court can consider its forthcoming motions to dismiss most of the suits.