What will it take for the security leaders of 2020 to be the true guardians of their enterprises? Daniel Lohrmann shares insight in a keynote address from the Gulf Information Security conference in Dubai.
A report that Russian hackers read President Obama's email correspondence raises further questions about White House cybersecurity, say IT security experts, who offer insights on protecting White House systems.
The Department of Defense has unveiled an updated cybersecurity strategy that officially acknowledges for the first time that the U.S. military is willing to use cyberwarfare to defend U.S. interests against cyber-enemies.
A class-action suit filed by U.S. banks and credit unions that's pending against Target could prove fruitful for the banks and credit unions, says attorney Chris Pierson, chief security officer at invoicing and payments provider Viewpost.
Miercom, a leading security testing firm, recently performed a head to head security efficacy analysis of network-based breach detection and Advanced Persistent Threat (APT) prevention solutions that utilize sandboxing. Zscaler Internet Security and FireEye Web MPS 1310 were tested, and Miercom found the Zscaler...
In conducting due diligence, investors spend more time than ever assessing the cyber-risk posed by the company targeted for acquisition, says Jacob Olcott, VP for business development at Bitsight Technologies.
Protecting against advanced cyber-attacks requires, among other things, that you meet the same level of sophistication as your attackers. Unfortunately, most current security technologies fail to meet that bar, resulting in organizations being breached when they thought they were protected.
A resulting breach can be...
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won't abandon their transaction while at the same time stopping illegitimate attempts to transact.
The...
Point-of-sale systems provider Harbortouch Payments has confirmed that it recently identified and contained a malware breach that affected "a small percentage" of the merchants that it serves.
The Department of Homeland Security will establish a Silicon Valley satellite office to improve relations with IT security vendors and recruit cybersecurity talent, Homeland Security Secretary Jeh Johnson said in a keynote address at RSA Conference 2015.
Building an enterprise security operations center (SOC) can be an effective path to reducing security vulnerabilities. An enterprise SOC encompasses the people, processes and technologies that handle information technology (IT) threat monitoring, forensic investigation, incident management and security reporting. It...
Analyzing data can generate transformative insights, whether for individualizing marketing campaigns, understanding business risks or creating smarter cities. Leading organizations are looking to develop more and deeper insights by extending their enterprise architectures to accommodate data from new sources. When...
As networks continue to grow in size, complexity and level of business importance, the potential for malicious attacks grows right along with them. Today, there are hackers working around the clock, plotting threats through spyware, worms, botnets and shell code to exploit new vulnerabilities. Responding to these...
Major data breaches affecting some of world's largest organizations have elevated cyber security to a top concern of executives and board directors. These data loss events can result in serious repercussions for businesses, including financial damage.
When it comes to significant breaches, BitSight botnet grades...
As organizations strive to securely deliver high-quality, high-availability services to users around the world, they grapple with ever-changing user populations, access points and applications that are increasingly dynamic, distributed and mobile. While the traditional forms of server, network and data security are...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.