In the wake of the Paris massacre, the head of Britain's MI5 domestic intelligence agency has called for new powers to fight extremism, warning that as terror plots increase, communications-interception capabilities are decreasing.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
Symantec named a Leader in the The Forrester Wave: Enterprise Mobile Management, Q3 2014. Read the Forrester Research, Inc report and get in-depth expertise on the enterprise mobility market.
We recommend this analyst report for anyone evaluating enterprise mobility solutions or looking to gain a better...
We recommend this analyst report for anyone evaluating enterprise mobility management (EMM) solutions or looking to gain a better understanding of the market.
Download this report for leading industry insight and to learn:
Key trends that have been identified;
The benefits of an effective EMM...
Want to protect your hard earned email reputation and brand from phishers and spoofers? Not sure where to start or do you find DMARC implementation confusing and time consuming? The Getting Started with DMARC guide will tell you everything you need to know about DMARC and how to quickly get up and running....
FBI Director James Comey's Jan. 7 defense of the bureau's attribution of the Sony Pictures hack to North Korea hasn't silenced many information security experts, who argue that the scant evidence divulged to date proves nothing.
Online shoe and clothing retailer Zappos has reached a settlement with nine state attorneys general over a 2012 data breach that exposed the personal details of more than 24 million customers.
French authorities continue to investigate the Jan. 7 attack in Paris that claimed the lives of a dozen, including journalists and police officers. Information security experts say that cyber-forensic skills are crucial for finding the perpetrators.
Ninety percent of even the largest global firms are susceptible to targeted attacks. And if adversaries want to get in, they can, says Peter George, CEO of Fidelis Security Systems, who discusses new security strategies.
Information is the life blood of modern business - and increasingly under attack from both traditional insiders motivated by financial gain, and external hackers that compromise insider accounts for criminal purposes and nation state goals.
With insider threats spanning both these areas, this webinar features...
In a Jan. 7 speech, FBI Director James Comey highlighted a bit of evidence to defend his agency's conclusion that North Korea was behind the cyber-attack on Sony Pictures Entertainment.
Police in Finland are investigating a series of DDoS attacks against the country's OP Pohjola financial services group that have intermittently shut down online banking and direct debit services. The hacking group "CoreSec" has claimed credit.
Credit rating models transformed the way we do business and have existed for almost a century. Now, these same models are inspiring a new way of managing vendor security risk by using externally collected security data to assess and quantify security performance.
Download this white paper to learn:
The...
With the FBI reportedly investigating whether any U.S. financial services firms waged illegal hack-back efforts after DDoS attacks, some security experts contend that hacking back is a bad idea because the cyber-retaliation could cause more problems.
European Bitcoin exchange Bitstamp has temporarily suspended its services after some of its operational wallets were compromised on Jan. 4, resulting in the theft of 19,000 Bitcoins, worth more than $5 million.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.