Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.
Even a few weeks after the RBI announced its plan to consider removal of the two-factor authentication requirement for small-value transactions, security critics continue to react strongly against the notion.
The identity federation standard, Security Assertion Markup Language, or SAML, enables single sign-on (SSO) and has a wide variety of uses for businesses, government agencies, non-profit organizations and service providers. With the wealth of internal and external web applications and services, federated identity is...
You've screened your candidate, hired them into the position, assigned them resources and granted them access...now what? Hope they don't rob you blind? Trust them completely? The real job has just begun, now you have to:
Translate risk levels into appropriate levels of scrutiny, the greater the access, the...
Symantec named a Leader in the The Forrester Wave: Enterprise Mobile Management, Q3 2014. Read the Forrester Research, Inc report and get in-depth expertise on the enterprise mobility market.
We recommend this analyst report for anyone evaluating enterprise mobility solutions or looking to gain a better...
Proactively managing information within financial services has never been more important - and more challenging - than it is today. Tumultuous global financial conditions have given rise to two powerful - and sometimes conflicting - objectives: 1) to address data proliferation inside their firms, and 2) to enhance...
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
Today's customers commonly demand access from any device to any app, anywhere, anytime. But managing high-volume customer identities and supporting digital interactions across web, mobile, and API-based environments raise new identity and access management challenges and magnify any gaps or inefficiencies in security....
As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
For virtualization security, there's no one size fits all solution...and trying to fit your organization's specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?
A new whitepaper from Kaspersky Lab, Virtualization Security Options:...
Did you know 59% of people fail to store their passwords securely?
With users connecting to unsecured public networks and running multiple applications from both company and personal devices, sensitive corporate data is more vulnerable than ever before. For your security policies to be effective, they need to bring...
A staggering 1/3 of businesses have experienced lost or stolen staff mobile devices and, of those, 1/4 have lost data as a result.
With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints...
Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.
Download "Security for...
All organizations with an on-line presence need to quickly and efficiently detect hackers and fraudsters. However, to avoid frustrating the very people you want to feel welcome, it's critical that authentication processes be as simple as possible.
The newest generation of authentication technology utilizes shared...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.