There's an app for that...but is it secure?
Home-grown enterprise apps improve productivity, business partnerships, customer satisfaction and bottom-line performance. But all too often, security is an afterthought and little more than thin shield from issues of compliance and privacy that plague many...
Enabling Simple and Secure Mobile Collaboration for Business:
Once upon a time, mobility was synonymous with email access. But, mobile collaboration now has so much more potential to unlock true productivity and facilitate real work in real time. Many companies have only scratched the surface and have yet to...
The last two years have seen the largest "mega" data breaches in history. In an attempt to better understand the effects these data breaches have on consumers. A study conducted by the Ponemon Institute, surveyed consumers on a variety of topics related to their feelings and behaviors in the wake of being a data...
As the era of big data continues to march forward, so does the number of data breaches. In fact, studies indicate that companies are attacked an average of almost 17,000 times per year, and many of those attacks result in a quantifiable data breach.
With this reality facing us, many security experts are...
Consumers see the advantage of accessing banking capabilities from their mobile device. However, today's mobile devices lack security to stay ahead of the evolving mobile threat landscape. Cyber criminals will continue to target the mobile channel with sophisticated attack techniques and new emerging techniques in the...
A new study shows the accuracy of facial recognition algorithms has markedly improved over the past three years, though one of the report's authors suggests they're not at the level to be a highly reliable form of authentication.
Identity fraud is one of consumers' most feared crimes, and at banks those schemes translate into application fraud. FICO's Adam Davies discusses today's common application fraud scams and how to stop them.
Organizations of all sizes have difficulty finding the time, personnel or cash to install a security monitoring solution, so they make do with periodically checking logs - except the logs often don't get checked, and many
times, the personnel doesn't even know how to look for security issues.
This white paper...
The promise of SIEM is to provide continuous situational awareness, automate compliance reporting, and support the incident response process through root cause analysis and serve as an investigation
platform. Unfortunately, due to the perceived negatives, smaller, more resourced-constrained security departments that...
Breaking down silos should help organizations mitigate vulnerabilities introduced into their systems from the information and communications technology supply chain, says the co-author of new guidance from NIST.
When NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
We've been talking about shifting away from legacy mag-stripe technology and a move toward EMV chip cards for the last decade in the U.S. So is it too late, or is there still hope for EMV?
Mobility Expert Michael Finneran and Zix general counsel Jim Brashear highlight the legal risk of BYOD and what factors to consider when developing a new BYOD strategy or modifying an existing one.
Read this white paper to learn about:
Obligations to protect data;
Selecting the right solution;
Setting the...
As global financial institutions seek to grow their customer base and the bottom line, each must increasingly combat sophisticated cybersecurity threats while navigating the growing challenge of compliance risk.
Entrust's identity-based security solutions are specifically tailored to protect financial...
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security.
Entrust IdentityGuard Cloud Services provide digital certificate and identity...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.