A bank's $350,000 settlement with a California oil company should serve as a reminder that reasonable security measures offered by banks are increasingly critical to the outcome of account takeover disputes.
Infrastructure security used to be more manageable. But it's far more complex in today's cloud environment. Carson Sweet of CloudPassage shares insight and strategies to improve cloud infrastructure security.
How can IT keep up with the ever-expanding universe of mobility?
Enter Enterprise Mobility Management (EMM), which encompasses all aspects of mobility that IT must secure and manage. Download this white paper to learn:
How the demand for mobile security has changed;
What organizations of all sizes must do...
There's an app for that...but is it secure?
Home-grown enterprise apps improve productivity, business partnerships, customer satisfaction and bottom-line performance. But all too often, security is an afterthought and little more than thin shield from issues of compliance and privacy that plague many...
Enabling Simple and Secure Mobile Collaboration for Business:
Once upon a time, mobility was synonymous with email access. But, mobile collaboration now has so much more potential to unlock true productivity and facilitate real work in real time. Many companies have only scratched the surface and have yet to...
The last two years have seen the largest "mega" data breaches in history. In an attempt to better understand the effects these data breaches have on consumers. A study conducted by the Ponemon Institute, surveyed consumers on a variety of topics related to their feelings and behaviors in the wake of being a data...
As the era of big data continues to march forward, so does the number of data breaches. In fact, studies indicate that companies are attacked an average of almost 17,000 times per year, and many of those attacks result in a quantifiable data breach.
With this reality facing us, many security experts are...
Consumers see the advantage of accessing banking capabilities from their mobile device. However, today's mobile devices lack security to stay ahead of the evolving mobile threat landscape. Cyber criminals will continue to target the mobile channel with sophisticated attack techniques and new emerging techniques in the...
A new study shows the accuracy of facial recognition algorithms has markedly improved over the past three years, though one of the report's authors suggests they're not at the level to be a highly reliable form of authentication.
Identity fraud is one of consumers' most feared crimes, and at banks those schemes translate into application fraud. FICO's Adam Davies discusses today's common application fraud scams and how to stop them.
Organizations of all sizes have difficulty finding the time, personnel or cash to install a security monitoring solution, so they make do with periodically checking logs - except the logs often don't get checked, and many
times, the personnel doesn't even know how to look for security issues.
This white paper...
The promise of SIEM is to provide continuous situational awareness, automate compliance reporting, and support the incident response process through root cause analysis and serve as an investigation
platform. Unfortunately, due to the perceived negatives, smaller, more resourced-constrained security departments that...
Breaking down silos should help organizations mitigate vulnerabilities introduced into their systems from the information and communications technology supply chain, says the co-author of new guidance from NIST.
When NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
We've been talking about shifting away from legacy mag-stripe technology and a move toward EMV chip cards for the last decade in the U.S. So is it too late, or is there still hope for EMV?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.