You've found a virus running on your server. You discover login IDs on your network that don't belong. A hacker has your credit card database. Any one of these is enough for you to hit your panic button and lose it. Don't.
In this eBook, learn:
Tips on how to handle various emergency scenarios;
The necessary...
Managing and administering software updates remains one of the most challenging, tedious and resource-intensive tasks an IT Department undertakes on a daily basis. The constantly evolving software landscape makes patch management an important consideration for all IT decision makers, regardless of the organization...
Hackers were using a Facebook page as a how-to site for financial crime and to sell banking Trojans. One RSA security expert says this public promotion signifies the mainstreaming of "fraud-as-a-service."
In light of evolving fraud threats, financial institutions increasingly are turning to two-factor authentication solutions. Alex Doll, CEO of OneID, offers advice to help institutions make the right choices.
In an interview about the myths and realities of two-factor authentication, Doll discusses:
The current...
At the outset of the BYOD trend, mobile security was about protecting devices. Today, mature organizations are focused more on protecting data and ensuring proper identity and access management.
In this exclusive session, a sequel to Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices, Malcolm...
The cost of a data breach or privacy violation goes far beyond compromised records to include hard-dollar expenditures for breach notification, credit monitoring, regulatory fines and legal fees. Not to mention the immeasurable cost of reputation loss.
To avoid these losses, security leaders are increasingly...
A Senate panel approved a bill to strengthen e-mail privacy protections despite concerns expressed by the head of the Securities and Exchange Commission that the legislation could hinder investigations.
Imagine this: A lewd picture of Anthony Weiner is sent from his Twitter account, and he claims his account was compromised, and that a hacker sent the image. Would you believe him?
In today's challenging security environment, using the best products that fulfill your business needs is paramount. So when evaluating solutions, be sure to look at all aspects of a product - including performance benchmark testing.
PassMark Software is a leading authority in software and hardware performance...
A 143-point drop in the Dow Jones Industrial Average proves the power of social media and the havoc it can cause when an account gets hacked. It's time for social media companies to tighten the authentication process.
New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
This white paper discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and...
Traditional antivirus products are based on the idea of distributing threat signatures to endpoints and using the resources of the endpoint systems to compare files with those signatures. If you are evaluating antivirus products, you face a dilemma.
Read this white paper to answer questions about how to:
Improve...
Phishing attacks are on the rise, and cybercriminals' methods are changing. How can the DMARC initiative help reduce phishing incidents? Phishing expert Paul Ferguson explains.
A new survey reveals the willingness of consumers to accept other authentication factors beyond username and password, even if they require more work on their part.
Schnucks, a grocery chain that last month revealed it suffered a POS network attack, now says millions of payment cards were likely exposed. How many stores were affected, and was Schnucks PCI compliant?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.