Extortionists employing telephony-denial-of-service attacks - a close relative to distributed-denial-of-service attacks - are targeting emergency communications centers that dispatch first responders.
The FTC puts the onus on application developers to protect their organization's sensitive data by mandating the use of "reasonable" data security practices. What does this mandate mean in practice?
Most cloud security discussions have focused on what cloud providers can do, what they can't do and what they might do if you pay them enough. These discussions focus on topics such as virtualization, hosting and data storage. However, just as the software industry has learned that putting fancy boxes on the
network...
The prevalent approach to security management and operations is to implement on an ad hoc and technology-focused basis. This haphazard approach is no longer adequate.
This report details:
The current state of the market and what to expect moving forward;
Research implications for technology vendors;
Research...
As part of the software development process, security professionals must make choices about where to invest their budget and staff resources to ensure that homegrown applications are as secure as possible.
This research brief details:
Best practices for all organizations that would like to produce more secure...
The fact is that the world is constantly evolving and always connected - and your enterprise must be too. Forward-thinking enterprises realize that they need to focus on a sustainable approach to security and risk management - one that is designed to address the new wave of vulnerabilities that prevail due to...
Attacks against Facebook, Twitter and other organizations over the past few months should send a message to business owners that they need to better fund cybersecurity, IT security expert Mischel Kwon says.
Organizations outsourcing card data management to the cloud face significant security risks. How should they prioritize risks when reviewing cloud-vendor solutions? The PCI Council's Bob Russo offers insight.
A major hurdle preventing companies from adopting new technologies is information security, says IBM's Dan Hauenstein, who outlines strategies organizations can take to overcome the barrier.
What are the common mistakes individuals in organizations make when it comes to data security and breaches? Craig Spiezle of the Online Trust Alliance provides insight from the latest research.
Understanding big data is not the problem, say Michael Fowkes and Aaron Caldiero of Zions Bank. Figuring out how to use the information contained within big data in a meaningful way - that's the trick.
Organizations looking at implementing encryption should consider taking a unified approach, says Karen Scarfone, who coauthored NIST's encryption guidance. Learn about her other recommendations.
Want to know how predictive analysis could work to defend your IT systems? Take a look at how American Navy SEALS found Osama bin Laden, says Booz Allen Hamilton's Christopher Ling.
What can organizations do to improve security after a network attack? Post-breach investigations help security leaders trace steps and strengthen weak points, says investigator Erin Nealy Cox.
DDoS attacks on banks are becoming more rampant, advanced and persistent. Attackers are continuing to work around the clock in developing and sharpening their toolset and methodologies used to perform these attacks.
Most attacks have been brute-force against multiple institutions; others have been subtle, probing...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.