The kind of detailed data analysis that helped statistician Nate Silver predict accurately the outcome of the U.S. presidential election could help enterprises using cloud-based SIEM to identify vulnerabilities, says Cloud Security Alliance's Jens Laundrup.
This whitepaper from Forrester Research, "Kill Your Data to Protect it From Cybercriminals," shares best practices about how you can make cybercriminals bypass your network and look for less robustly protected targets, and addresses why key and certificate management is becoming the benchmark for effective security...
Mobility continues to change the landscape for security professionals concerned with data loss and the growing number of endpoints, says CTO Dan Hubbard, who offers mitigation strategies.
Budgets are a big issue today for those managing their risk management frameworks, says NIST's Ron Ross, who offers his advice on using cloud as a means to save money and improve IT infrastructure.
The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
Smaller institutions could use some advice on security for mobile banking and cloud computing. But federal banking regulators apparently don't plan to issue technology-specific guidance.
As users increasingly use mobile devices and operate outside the traditional corporate network, the concept of "endpoint security" has to evolve. And so do your strategies to secure the endpoint from sophisticated adversaries such as advanced persistent threat.
Register for this webinar to learn more about:
Why...
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.
Cloud computing and mobile technologies add new complexities to how we approach identity and access management. RSA CTO Sam Curry offers advice on overcoming the challenges.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
What are organizations' top cloud security concerns, and how are security leaders addressing these concerns through policy, technology and improved vendor management?
These are key questions posed by the 2012 Cloud Computing Security Survey, which was crafted with assistance from leading experts in cloud...
Her first nine months on the job included a data breach and a CEO shakeup. Hear how Symantec CISO Patricia Titus has adapted to business change and re-focused the company's security team.
High Roller malware attacks are the latest potential threats that point toward the need for layered security controls. What advice do banking/security leaders offer for responding to these attacks?
Organizations first using the cloud have the chance to test and identify issues. Yet, many neglect to do so, says Gartner's Anton Chuvakin, who offers recommendations for secure cloud computing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.