The good news for security leaders: Because of SSL/TLS, nearly every bit of web data in transit is now encrypted. The bad news: Threat actors are now masking their attacks inside of encrypted traffic. Kevin Stewart of F5 Networks explains why network visibility is not enough to detect these attacks.
The 2019 RSA Conference offers an opportunity to learn about new concepts across all aspects of cybersecurity. One such area is "data gravity," which will be the topic of a session featuring Microsoft's Diana Kelley and Sian John. They discuss the concept in a joint interview.
Fifty-four percent of survey respondents say their institutions' digital authentication measures are average or below when compared to their peers. And 55 percent rate themselves at average or below when it comes to their institution's current ability to apply the right amount of security to the right transactions at...
The evolution of the threat landscape has dramatically increased the size of the security team's technology stack. However, a large and complex security stack with low integration and too many point products will decrease system performance and create headaches for your understaffed security team.
In response,...
The Trump administration is leading a broadside against Chinese telecommunications giants Huawei and ZTE. But concerns that Chinese networking gear could be used as backdoors for facilitating state-sponsored surveillance or disrupting critical infrastructure are not limited to America.
Hackers have breached the Australian Parliament's network, although investigators say they have found no evidence that attackers stole any data. But Parliament's presiding officers said all users have been ordered to reset their passwords as a precaution.
IT security teams have to protect their organizations from cyber attackers while also addressing internal and regulatory compliance requirements, such as ISO 27001, PCI DSS or GDPR. This is no small task. If you're relying on a basic log manager or rudimentary spreadsheets to store and search through logs, chances...
Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution.
Gartner named IBM a Leader in the 2018 Gartner Magic Quadrant for...
The adoption of SaaS applications is transforming the secure web gateway (SWG) product category, propelling the growth of cloud-based SWG market 6X over appliance-based SWG products. Remote browser isolation has emerged as a key next generation technology for SWGs since it provides more comprehensive protection...
Germany's competition authority, the Bundeskartellamt, has prohibited Facebook from combining user data from different sources unless users consent, and it has also prohibited Facebook from blocking users who do not provide this consent. Facebook has one month to appeal the antitrust decision.
Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent.
Download this flipbook to learn more about:
7 ways fraudsters are slipping through the net;
What to watch out for;
How to combat fraud...
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar...
Sophos is out with new reports on Matrix and Emotet,
two types of cyberattacks that are hitting enterprise
defenses.
Matrix is a targeted ransomware, an emerging type of attack Sophos expects to gain
prominence, and Emotet is malware that has evolved over the years into an opportunistic,
polymorphic threat that...
Identity theft is the fastest growing crime in the US and accounts for half of all reported fraud in the UK, with 1 in 60 online transactions attempted globally being fraudulent.
Download this flipbook to learn more about:
7 ways fraudsters are slipping through the net;
What to watch out for;
How to combat fraud...
It's a bigger game than ever. The number of new users signing up to gambling platforms is on the rise. Big sporting events are catalysts for these signups: this year, one in three Britons bet on the World Cup.
79% of users will go elsewhere if the onboarding user experience doesn't live up to their expectations....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.