The media continues to report that the threat landscape is evolving. But this is a common cliché that can smokescreen reality. In fact, significant security events tend to share notable commonalities. Regardless of whether the attack is a widely distributed banking Trojan extracted from a phishing email or a targeted...
An important component of building an effective cybersecurity strategy is to understand the mindset of attackers, says IBM Security's Etay Maor, who offers insights.
Fortinet's FortiGuard Labs global threat research team is creating research playbooks that provide deep-dive analysis of not only threat trends, but also cybercriminal and adversary tools and techniques. Derek Manky and Tony Giandomenico discuss the playbook model and how it can help in the fight against cybercrime.
Disruption continues to reshape the financial services industry. Time-proven products and services have been rendered obsolete in the blink of an eye, rewriting the banking landscape and leaving it scattered with new challenges.
Online banking and faster payments have been embraced by customers, but money launderers...
The digitalization of business processes and advent of mobile computing have given rise to the next generation of fraud. Cyber-criminals have a variety of tools and techniques - as well as opportunities to steal money and services.
Companies need a new approach to fraud prevention - one that stops fraud early and...
Mike Cotton of Digital Defense sees a key shift in the threat landscape, as attackers focus more on attacking key endpoints and infrastructure. As a result, many organizations are developing security blind spots. Cotton explains how to regain visibility.
As a preeminent academic medical center, The Milton S. Hershey Medical Center is home to many top-tier academics focused on cutting-edge healthcare research. Matthew Snyder, CISO at Hershey Medical Center, observed, "A single data compromise can negate the work that a researcher has performed over a 20-to-30 year...
A recent spate of attacks targeting domain name system protocols and registrars, including several incidents that researchers believe have ties to nation-state espionage, is prompting the U.S. and U.K. governments to issues warnings and policy updates to improve security.
Cyber adversaries are resilient and move quickly, so it'st critical that organizations share threat intelligence in an automated way, says Shawn Henry of CrowdStrike Services. But that sharing has been hampered by a lack of understanding of why it's important and how organizations can benefit, he says.
Threat intelligence programs have evolved greatly over the past decade. But Mario Vuksan, CEO of ReversingLabs, says too many organizations are overlooking the value of local intelligence embedded in their own networks. Vuksan talks about maximizing TI resources.
With the volume of data breaches
and cyberattacks continuing to rise,
organizations are increasingly relying on
Breach and Attack Simulation tools to
provide more consistent and automated
validation of controls, says Cymulate's
Tim Ager.
Download this eBook to learn more about:
The state of data breaches and...
The cyberattack earlier this year against Indian outsourcer Wipro, as well as several of its customers, is part of a much larger, multiyear phishing campaign that involves many more companies used as jumping off points, according to RiskIQ, which says the attackers apparently are manipulating gift cards.
Cloud computing has inherited security advantages when properly deployed, but the reality is that any fast-growing platform is bound to see a proportionate increase in incidents. Organizations are finding that they have to realign - and in some cases, reinvent - their security programs for this new reality.
This...
Malware continues to increase in sophistication and routinely evades organizations' cyber defenses. Development of new detection and defense processes for combating malware is critical.
These new strategies for combating advanced malware must move beyond existing detection approaches and focus on filling the...
A top cybersecurity imperative for organizations is to "take proactive mitigation before an event even occurs" by tracking attack trends and mitigating against emerging types of attacks, says Akamai's Jay Coley.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.