ESG research indicates that many security professionals feel like the malware threat landscape is getting worse. Why? Aside from targeted attacks conducted by cybercriminals and nation-states, hackers are getting more creative using ad networks, partner websites and mobile applications to attack organizations or...
When IT professionals think about information security, they often think about network intrusion detection systems (IDS) and intrusion protection systems (IPS) early in the process. Network IDS/IPS has long been a mainstay for detecting malicious activity and continues to be a very important piece of the security...
The explosion of breaches in 2014, especially highly-publicized payment breaches, created a substantial shift in consumer behaviors and attitudes. As a result, the breach landscape has fundamentally changed and businesses are scrambling to adapt. Now, more than ever, businesses are held accountable by consumers and...
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
The U.S. likely won't complete its implementation of EMV for many years to come, despite the October 2015 liability shift date for counterfeit card fraud, many forecasters say. And until it's fully deployed, EMV will have little impact on fraud.
New York State Attorney General Eric Schneiderman proposes updating state law to require businesses, including out-of-state firms with New York customers, to implement new safeguards to protect personal consumer data they store.
Choosing the best privileged password management solution for your enterprise is an important decision. Read this tech brief before you invest to learn about solutions that are fully integrated, flexible and cost-effective. Plus, hear about the:
Benefits of unmatched access control;
Time-saving...
The FBI's attribution of the attack against Sony Pictures Entertainment to North Korea was based, in part, on NSA intelligence gleaned from the agency having infected a significant number of North Korean PCs with malware, a news report says.
Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. That's the stark conclusion of new data gathered by more than 1,600 FireEye network and email sensors deployed in real-world networks. Following up on our May 2014 report,...
The numbers are staggering. Security alerts come in by the thousands every month, and you and your IT team are tasked with handling each one. Even when alerts are caught and categorized correctly, the sheer volume is overwhelming. And when they're not responded to quickly, the consequences can be disastrous.
In...
As the technology landscape evolves and attackers continue to adapt, we're going to see new vulnerabilities to mobile, new operating systems and the cloud - and new ways for attackers to exploit these weaknesses.
Download this whitepaper to learn:
Technical predictions for the upcoming year;
Business...
To optimize business productivity and reduce costs when collaborating over distances, IT organizations need to give users high-performance, easy-to-use methods for document collaboration, as if they were working with local colleagues. In addition, to protect business interests, they need to ensure that these solutions...
Enterprise risk has grown dramatically in both scope and complexity since the dawn of the digital era. Managed File Transfer (MFT) is a prime example of a necessary tool that can mitigate a plethora of risks, delivering value for enterprises worldwide. In this whitepaper you will learn:
Why a managed file...
The classic username+password authentication to an account is only as secure as the security and complexity of the password.Globalscape EFT Enterprise integrates with SMS PASSCODE® to provide mobile-based, two-factor authentication for added security. Download this whitepaper to learn:
The number one reason...
Businesses count on consistent, dependable access to their mission-critical resources and applications. A gap in this service - even for just a few minutes - can cause losses of data, business opportunities, and revenue. Download this whitepaper to learn:
How High Availability (HA) clustering for MFT services...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.