Advanced threats and mobile security were the buzzwords of the Gartner Security & Risk Management Summit. What new insights did thought-leaders share, and how can they reshape our security posture?
The OCC's DDoS risk warnings to community banks may indicate more regulatory scrutiny is on the way. Banks should prepare for more oversight of their cyber-attack reporting and threat mitigation practices.
When it comes to breach prevention, many organizations are improving their own security posture, but neglecting that of their strategic partners.
It's a wide gap that far too few organizations even recognize, says Tom Kellermann, vice president of cybersecurity at Trend Micro.
How are banking institutions responding to today's fraud threats, and what strides have they made to mitigate their risks? The 2013 Faces of Fraud Survey aims to answer those questions and more.
The participation of Microsoft and other software vendors in an operation to take down 1,400 Citadel botnets illustrates why more public-private collaboration is needed to tackle emerging cybercrimes, operation participants say.
National Security Agency Director Keith Alexander declined to say that the agency would stop using contractors in top secret IT positions to prevent a leak such as the one that exposed NSA programs to collect metadata on American citizens.
If you want to be in the know about cybersecurity, consider getting the latest version of NIST's Glossary of Key Information Security Terms, which provides 1,500 definitions.
Another organized cyber-attack and subsequent cash-out scheme illustrates increasing risks to the U.S. payments chain. One fraud expert says this trend "is of grave concern" for banking institutions and their accountholders.
Having the right log and access management tools in place - and not all tools are used by all agencies at all times - doesn't mean that the proper authorities are alerted in a timely manner to activities that could jeopardize the nation's security.
Financial fraud expert Joe Rogalski explains why card issuers are ultimately responsible for losses linked to ATM cash-out schemes, like the $45 million worldwide cyberheist that made headlines last month.
A recent ATM cash-out scheme that netted $45 million puts a spotlight on the need for preventive measures, says John Buzzard of FICO's Card Alert Service. He offers several fraud mitigation tips.
When it comes to breach prevention, many organizations are improving their own security posture, but neglecting that of their strategic partners. Trend Micro's Tom Kellermann outlines third-party risks.
In an interview about virtual supply chain threats, Kellermann discusses:
Supply chain gaps organizations...
Regulations initially cause organizations to spend more funds on data breaches, but eventually those rules could save enterprises money, the Ponemon Institute's Larry Ponemon says in analyzing his latest study on breach costs.
On average, 86 percent of web applications have at least one serious vulnerability, and each app is attacked about 4,000 times per year, says Imperva's Terry Ray. So, how must security be improved?
Operating in a cloud environment opens up organizations to a new dimension of insider threat problems, says Alex Nicoll of Carnegie Mellon University's CERT Insider Threat Center.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.