On the technical side, authentication is much the same as it was years ago. But the way consumers are using two-factor authentication products has dramatically changed, says Vasco's Jan Valcke.
A new study from Neustar shows DDoS attacks in the United Kingdom are often used as a smoke screen for malware attacks or theft, says security specialist Susan Warner.
When considering security products, companies need to run test scenarios to make certain the product can handle their type of traffic, says Ixia's Richard Favier.
Faced with a vulnerability that exposes Microsoft's Internet Explorer Web browser to a zero-day exploit involved in recent targeted attacks, CISOs need to take prompt action, security specialists say. Learn the steps they recommend.
Target on April 29 announced the appointment of a new CIO and described its new security initiatives in the wake of last year's massive breach that compromised 40 million credit card numbers.
Saying the administration had no advanced knowledge of the Heartbleed bug, President Obama's top cyber adviser has outlined circumstances in which the government would not disclose software vulnerabilities, though such conditions would be rare.
Paul Kleinschnitz, general manager of payment processor First Data's cybersecurity solutions team, says there are plenty of technologies to address payment card security, but cyberthreat awareness is still lacking.
"If you're not doing the right things on managing vulnerabilities, it doesn't really matter what other kinds of sophisticated things you do - that's the baseline for security," says BeyondTrust's Marc Maiffret.
Cloud-based "testing-as-a-service" and "security-as-a-service" platforms can make security more accessible to smaller organizations, says Spirent's Brian Buege.
The recent Verizon Data Breach Investigation Report notes more than 16,000 incidents in the past year where sensitive information was unintentionally exposed. "Nearly every incident involves some element of human error," the report notes.
The fact that the U.S. federal government would, under some circumstances, exploit software vulnerabilities to attack cyber-adversaries didn't perturb a number of IT security providers attending the 2014 Infosecurity Europe conference in London.
AOL is investigating a data breach that involved unauthorized access to information about a "significant number of user accounts." Learn what information was exposed.
Following news of a serious zero-day exploit impacting several versions of Internet Explorer, the Department of Homeland Security is urging the use of other Web browsers until the issue has been remediated.
The Consumer Bankers Association doesn't have an official stance on lawsuits that have been filed by banks against breached retailers, but the association's David Pommerehn says the CBA does support banks' rights to recover losses.
Instead of approaching mobile defensively, banking institutions should be discussing how mobile integration can improve cross-channel security, says Jim Van Dyke of Javelin Strategy & Research.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.