Since the beginning of web application delivery, there has been an opportunity for fraudsters to get into the middle of a transaction and impersonate the legitimate user. Since the credentials used for this fraud are valid and "expected to be under the control of the real user," this type of impersonation has been...
Users spend, on average, 82% of their mobile minutes with apps and just 18% with web browsers. It's the lean, restricted functionality of mobile apps that makes them both convenient and task-oriented - and a major reason why they're so attractive to consumers and businesses. But mobile app development and the...
The trends impacting business today-cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing- make the need for strong authentication more important than ever.
The IT department can no longer firmly establish a network perimeter and rely on simple username and...
IT and the business are being impacted by many important trends-cloud adoption, increased mobility, the rise of social media, and the increasing flow of information across the extended enterprise. The old network perimeter is no longer relevant. Today's IT must deal with highly distributed identities across the...
"Trust" does not mean giving employees unrestricted and unnecessary access to information. With the right security controls, organizations can significantly reduce their exposure to the risk of insider threats. The key is to find the right balance between employee enablement and control, while holding employees...
The traditional dangers IT security teams have been facing and overcoming for years are being replaced by a far more hazardous, insidious form of attack: the Advanced Persistent Threat (APT).
Although APTs are an emerging threat vector, their impact has already been felt in substantial ways.
This white paper...
Schools are embracing the use of technology to cut costs, to perform research, roll out computer-based classes and exercises and to compete for students. At the same time, the school administration is being asked by parents, state, local, regional or even federal governments to make sure that students and faculty are...
Browser-based filesharing applications have made moving large files a very simple task for the masses. Large graphics files that cannot be sent via email due to size restrictions can now be transmitted using YouSendIt! or drop.box. These applications are easier to use than FTP and the risk of inadvertent sharing of...
Mobile file sharing has become a necessity for today's enterprises. Nearly all workers are mobile, and most workers are carrying three mobile devices, including a smartphone and a tablet. To stay productive, workers need access to all their files on all their devices. They also need to be able to share files...
The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Unfortunately, enterprise mobile security falls short much of the time.
Download this white paper to...
The growing requirement for mobile access and BYOD (Bring Your Own Device) can give organizations
significant headaches in areas of security, management of devices, and content availability. How employees
access corporate information is changing and organizations need to respond to these changes or risk having...
Nearly two dozen privacy and civil liberties groups contend the Senate cyberthreat information sharing bill could provide a backdoor to allow the National Security Agency to spy on Americans.
Could too much regulatory oversight hinder cyberthreat information sharing, rather than encourage it? That's an increasing concern for bankers, who argue regulators could bog down progress in cybersecurity.
Tim Pawlenty, CEO of the Financial Services Roundtable, says the only way to ensure adequate cyberthreat information sharing is through federal legislation that would furnish liability protection and other incentives.
Banking institutions must improve how they analyze cyber-threat intelligence. But without better tools, security leaders can't adequately anticipate new attacks, says Greg Garcia, the new executive director of the FSSCC.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.