Corporate credentials. They're the keys to your enterprise and more than likely you've taken many steps to protect them. However, what many CISOs and security managers are finding is that traditional approaches to preventing credentials theft from implementing stringent identity management policies to deploying...
In a world where a week rarely goes by without reports of at least one serious cyber attack against a major organization, it's important to ask; What's happening across the threat landscape? What kinds of attacks are being launched? How many of those attacks result in incidents requiring investigation?
Download...
IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.
Download this white paper to learn:
How managing...
Around the world, employees increasingly use their own mobile devices in the workplace, often accessing corporate applications after-hours and off-site. In fact, a recent survey found that 86 percent of organizations either allow or plan to allow the use of employee-owned devices for work functions. Within these...
Many of the same characteristics that make cloud computing attractive can also make it challenging to secure. When a cloud is up and running today and gone tomorrow, or when the number of users quickly changes from 50 people in one city to 50,000 across the globe - how do you keep it secure?
Download this white...
The advent of cloud computing is beginning to transform the way companies engage with customers, partners, and suppliers to increase flexibility and streamline operations. Cloud computing makes it much easier for the organization to implement new business services and to create new revenue opportunities much faster....
Adhering to the Payment Card Industry Data Security Standard (PCI DSS) is one way that organizations attempt to protect their customers' sensitive payment card data from attack. However, PCI DSS compliance provides only a baseline for securing cardholder data. In this age of mobile, social and cloud computing,...
Security threats are very real, and the stakes are higher than ever on today's information-centric and interconnected world. Ever-growing numbers of attacks can affect - and originate from - any country in the world. And these attacks are becoming more dynamic, more complex and more malicious all the...
As government agencies continue to face increasingly hazardous IT security threats, they are constantly challenged to keep these threats at bay while protecting sensitive - and often classified - data. To help them address these challenges, the US Department of Homeland Security (DHS) has been developing a process for...
When you have a smartphone or mobile device, the world is at your fingertips. Every day, there are new possibilities for mobile entertainment, shopping, banking, connecting socially and getting work done. But the speed at which mobile technology is changing has created dangerous gaps in security, and cybercriminals...
In the last year, some of the world's most prominent retailers have suffered the most devastating data security failures ever. The fallout from these episodes has been enormously damaging, both in direct financial costs as well as in terms of customer trust and goodwill: one major retailer hit by an attack saw a 46%...
Organizations are under increasing pressure to prevent security breaches by sophisticated teams that seek to steal sensitive data or other proprietary information - attacks that potentially put the organization, its employees or its customers at great risk. These targeted attacks are designed by skilled, innovative...
The ubiquitous connectivity of the "things" that enrich our lives, from thermostats to automobiles to medical devices, means software development is happening adjacent to cutting-edge technology developed by hardware manufacturers. The security industry can help guide the development of security practices for embedded...
All too often, an enterprise invests in security technology and services thinking that they'll be protected from a cyber attack only to discover that they are breached anyway. It prompts some sober reflection and a reassessment of their whole approach to security.
Businesses undertake a security program assessment...
All Windows operating systems are at risk from the SSL/TLS vulnerability known as Freak, Microsoft warns. The company has outlined temporary workarounds - except for Windows Server 2003. Experts say no in-the-wild attacks have yet been seen.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.