As the growth in mobile devices creates new opportunities for consumers and businesses alike, new threats are emerging. iovation's mobile fraud detection white paper will help you understand the evolving mobile landscape, the business and technical decisions that you may soon have to make regarding fraud risk and how...
As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, reflecting specific risks and markets, these laws share common investigation requirements in...
While we still use many of the same old names - viruses, Trojans, and worms - today's malware deserves much more respect than many are giving it. Where traditional viruses mostly aimed to disrupt operations or win fame for their coders' cleverness, today's malware enables potent multistage attacks called advanced...
This book provides an easy-to-understand introduction to protecting payment card data and a reference framework you can use as you work with architects, operations, analysts and assessors. This book covers not just the PCI DSS mandates themselves but also ways in which you can employ data protection techniques to...
Thales e-Security is pleased to present the 2011 Encryption Trends Study (United States) conducted by the Ponemon Institute. This study reveals how U.S. organizations are using encryption to protect their sensitive data and how the U.S. compares itself with other countries like Germany, United Kingdom, Brazil and...
The increased customer demand for mobile banking services carries increased fraud threats. FIs must wield this combination carefully to avoid fraud losses if they move too quickly or customer churn if they move too slowly.
This white paper highlights:
Current trends in mobile banking;
Fraud threats and...
Internet technology, and especially the virtualization and distributed processing power brought to life through cloud computing, have freed businesses to explore new business opportunities that simply weren't possible to consider just a few years ago. At the same time, however, the complexity and risk associated with...
While threats to network and information security have existed since the dawn of the information age, the complexity and scale of attacks have exploded in recent years, presenting enterprises with daunting challenges as they struggle to defend an increasingly vulnerable perimeter. Unfortunately, traditional perimeter...
Today's information security teams increasingly rely on security systems with big data capabilities. In order to seek out and detect today's complex advanced persistent threats you need to monitor network, host and application behavior across your organization's IT data.
Read this white paper to understand the...
Learn how security professionals are extending the use of Splunk with the Splunk App for Enterprise Security. This document describes how you can take full advantage of Splunk's analytics and visualization capabilities and unique ability to process big data.
With the ability to search and process known and unknown...
Today's security landscape includes a broader set of possible attacks and more innovative and targeted attacks coming from persistent adversaries. This solutions guide explores Splunk's unique security intelligence approach that monitors for known threats as reported by rule based systems and also watches for unknown...
Too many *ALLOBJ profiles? Unrestricted network access? Default passwords? Get answers to the questions that keep you up at night.
Each year, PowerTech audits hundreds of IBM i servers and compiles the data in its annual State of IBM i Security study.
Download the 2012 study to learn about new findings and...
Since the mid 1990s, financial institutions have struggled with the implementation of enterprise risk management (ERM) systems. Data is the lifeblood of these institutions, and data management is critical to the success of a strong ERM system. Yet even today, institutions struggle with compiling and efficiently...
Today's enterprises and government agencies are faced with advanced persistent threats (APTs). These attacks often use social engineering and other techniques to gain a beachhead on corporate networks. From there they probe and use "privilege escalation" to gain access to high-value information and then use stealthy...
In this whitepaper you will get an overview of Access Governance, introducing the concept, the business drivers, and the associated challenges. The paper explains a four-phase approach to achieving Access Governance and explores the capabilities that are required in each phase.
Topics covered in the whitepaper...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.