The most important thing to understand about dealing with a true advanced persistent threat (APT) is that it's like having pneumonia; by the time it's diagnosed you've probably had it for a while - sometimes a long while. It's often not easy to cure, and if you try to cure it without the right medication, it can...
In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's David Rockvam. It's time for a security evolution.
Mobility has driven the rise of containerization as a security strategy for employee-owned devices. But what about for contractors? Kimber Spradlin of Moka5 discusses how to mitigate third-party risks.
Commercial organizations are under increasing attack from financial crime. And as those carrying out traditional fraud are adopting new techniques, that until recently were the domain of sophisticated cyber espionage groups, commerce now has to manage a growing strategic risk to both their bottom-line and their brand...
The US Foreign Account Tax Compliance Act (FATCA) is a key piece of US federal legislation intended to improve tax compliance involving foreign financial assets and offshore accounts. FATCA requires Foreign Financial Institutions (FFIs) to identify any US account or policy holders and disclose their balances,...
Leading this week's industry news roundup, Fortinet has expanded its distributed-denial-of-service attack detection and mitigation product line, while Lockheed Martin has acquired Industrial Defender.
Recent retail breaches have exposed security vulnerabilities, highlighting the importance of shifting to much stronger user authentication as well as verification of the authenticity of transactions.
Motivated by idealistic and monetary goals, well-organized hacker groups have set their sights on financial institutions and are attacking with a vengeance - armed with institutional intelligence and striking with unprecedented persistence. Because of this, every financial services company - whether a multi-million...
One key factor in efforts to reduce reliance on passwords for authentication will be international acceptance of the FIDO Alliance's soon-to-be released protocol for advanced authentication, says Michael Barrett, the alliance's president.
Attackers likely purchased malware in underground "cybercrime-as-a-service" markets to use in recent credit card breaches, including the Target Corp. attack, a new report from McAfee Labs asserts. Adam Wosotowsky explains the report's findings.
In its latest executive brief, security industry analyst Frost & Sullivan examines why any organization can be a target, and how robust authentication is a proven strategy for reducing your vulnerability.
The insightful content focuses on:
Why even secure passwords aren't enough;
What makes an organization a...
In this paper, RSA examines the need for strong authentication. They explore the return on investment in order to help organizations make an informed decision when contemplating their strategic move toward more effective security.
This white paper explores:
The threat landscape;
True costs of password...
Many enterprises are moving quickly to adopt "big data analytics" - specifically, the application of advances in analytics techniques to the rapidly-expanding pool of information that enterprises have at their disposal to enable better decision making. As this trend of adoption continues, information security, risk...
MasterCard and Visa have announced the formation of a cross-industry group that will work on improving U.S. payment security by advancing migration to chip cards as well as point-to-point encryption.
Advice on how to encourage information sharing while preserving control over access to data is provided in a new special publication from the National Institute of Standards and Technology.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.