In this paper, the SANS Institute reviews how Damballa Failsafe can be the last line of defense to alert you when devices have been compromised.
This white paper will also:
Provide a forensic trail to show when the attack happened;
Identify what evidence there is that the attack was successful;
Mostly...
Twitter is suing the federal government, seeking to pave the way to publish its transparency report that documents the government's requests for user information.
Heartbleed, Shellshock, targeted attacks - the security threats to banking institutions are legion. And there are new banks can get better at detecting these evolving threats, says Solutionary's Jeremy Nichols.
An important lesson to learn from the massive JPMorgan Chase breach is that banks can't just focus on protecting card data and online banking accounts; they also must protect their customers' personally identifiable information.
Session Preview:
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do...
See how the detailed analysis of millions of voice-based transactions has produced a "signal in the noise." From large-scale analysis, clear patterns emerge of how stolen payment card information is actually qualified, updated and adapted for monetization. This process is most often carried out by social engineering...
Part1: Creating Actionable Intelligence, the Advances in Threat Information Exchange
Collecting security- and fraud-related data from multiple sources can often just result in creating a very large pool of unrelated facts. But begin to add context to that data and you now have information. Triangulate multiple pieces...
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
The Bring Your Own Device (BYOD) trend promised to deliver enhanced productivity, convenience and flexibility to your company. However, in everyday practice, you may have found implementing BYOD has been anything but convenient. If so, you're not alone.
Companies are still searching for a BYOD security strategy...
The model for threat detection is continually evolving in response to changing tactics utilized by malicious actors. Network-based threats are increasingly deceptive and dubious in nature; and, as a result, security technologies must be able to detect signs of an attack or intrusion attempt, rather than an exact...
The Food and Drug Administration has issued final guidance calling for manufacturers to consider cybersecurity risks as part of the design and development of medical devices. Find out what the agency recommends.
As researchers scramble to learn more about Shellshock and the risks it poses to operating systems, servers and devices, Michael Smith of Akamai explains why not all patches are actually fixing the problem.
As threats continue to penetrate networks, organizations need to find new ways to defend against them. NSS Labs recently conducted the most rigorous next generation firewall (NGFW) testing to date.
The NSS Labs NGFW reports provide the details on how Cisco models achieved:
Consistent, industry-leading...
This infographic hightlights a specific example of attackers targeting a feature within Microsoft Word - Visual Basic Scripting for Applications. While basic, the Office Macro attack vector is obviously still working quite effectively. When the victim opens the Word document, an On-Open macro fires, which results in...
Credit rating models transformed the way we do business and have existed for almost a century. Now, these same models are inspiring a new way of managing vendor security risk by using externally collected security data to assess and quantify security performance.
Download this white paper to learn:
The...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.