The Department of Defense has unveiled an updated cybersecurity strategy that officially acknowledges for the first time that the U.S. military is willing to use cyberwarfare to defend U.S. interests against cyber-enemies.
A class-action suit filed by U.S. banks and credit unions that's pending against Target could prove fruitful for the banks and credit unions, says attorney Chris Pierson, chief security officer at invoicing and payments provider Viewpost.
This e-book contains insights on breach readiness, response and resiliency based on in-depth interviews conducted with the Security for Business Innovation Council. Readiness benchmarks for the industry at-large are drawn from a global survey of 170 security practitioners in 30 countries. Measures within four major...
If you are reading this paper your most pressing concern undoubtedly is protecting your organization's intellectual property and sensitive customer data. Highly visible breaches and attacks have brought an intense focus on organizations' incident detection, investigation and mitigation capabilities. After all, if you...
Miercom, a leading security testing firm, recently performed a head to head security efficacy analysis of network-based breach detection and Advanced Persistent Threat (APT) prevention solutions that utilize sandboxing. Zscaler Internet Security and FireEye Web MPS 1310 were tested, and Miercom found the Zscaler...
A group of financial institutions affected by the 2013 Target data breach is asking a court to stop the settlement between the retailer and MasterCard that would provide $19 million to card issuers, saying the amount is grossly inadequate.
A breach at St. Vincent Medical Group in Indiana is the latest example of a healthcare organization falling victim to an apparent upswing in phishing attacks targeting employees. And it was the third data breach for the provider organization.
In conducting due diligence, investors spend more time than ever assessing the cyber-risk posed by the company targeted for acquisition, says Jacob Olcott, VP for business development at Bitsight Technologies.
Protecting against advanced cyber-attacks requires, among other things, that you meet the same level of sophistication as your attackers. Unfortunately, most current security technologies fail to meet that bar, resulting in organizations being breached when they thought they were protected.
A resulting breach can be...
Customers are embracing new technologies and their expectations are changing rapidly in today's connected world. They want to interact through a variety of applications, at any time and from any device. Banks, retailers and many other consumer facing organizations are racing to enable new interaction channels to...
The rapid proliferation of mobile devices has created additional security requirements for any organization attempting to increase its presence in the online market. And because smartphones and tablets afford end users a variety of new ways to interact with the enterprise, IT needs to evolve the security measures...
With customer loyalty at stake and competitive pressures on the rise, more and more businesses are increasing their mobile apps budgets and development efforts. By doing so, they hope to not only improve their ability to engage with customers, but also reap the benefit of a lower-cost business model. The...
Year after year, cyber threats continue to increase in both sophistication and frequency. One reason that data breaches are occurring is that passwords are created by people to identify themselves for multiple applications - from online banking accounts to a shopping site - and these passwords are valuable to...
It seems like every day we see in the news that another breach has occurred. In fact, the New York Times recently reported on a security breach that involved over a billion online account passwords. Why does this keep happening? One reason is that many websites continue to use simple passwords for authentication and...
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won't abandon their transaction while at the same time stopping illegitimate attempts to transact.
The...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.