Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
Apple's standoff with the U.S. government is creating a healthy debate about whether federal investigators, under certain circumstances, should have the right to circumvent the security functions of smartphones and other devices, says cybersecurity attorney Chris Pierson.
Simple conversations live at the heart of business. Migration to SIP enables you to have those conversations with customers, colleagues and partners with far greater reliability and security - and at significantly lower overall costs.
Download this infographic to explore the benefits of SIP and what to expect...
When it comes to responding to network security threats, it isn't just a matter of collecting and analyzing data. It's a question of how quickly you can put that data to work in your defenses.
Download this white paper to explore:
Which attack campaigns are the most concerning in 2016;
The attack...
In August 2015, BAE Systems and CUNA Strategic Services surveyed over 200 credit unions on a wide range of cyber security topics, including BYOD, vulnerability testing, incident response plans, working with security vendors, and more. The results are in, and they are eye-opening.
Download this infographic to find...
No financial institution is immune to a cyber attack; however, there are steps you can take to improve resilience, minimize risk, and most importantly, ensure you can detect, respond and remediate quickly to minimize damage. How prepared is your financial institution for a cyber attack?
Download this white paper to...
First-party fraud will be responsible for an estimated $28.6 billion in credit losses for financial institutions around the globe this year. Banks can significantly reduce their levels of bad debt and collections expenses by specifically targeting first-party fraud. Advanced network analytics with real-time screening...
Safeguarding your organization's email - the dominant form of business communication - is imperative for any organization. Anti-spam and anti-virus security isn't enough to protect your organization. Cyber attacks are now targeted, expertly-crafted and well-funded.
Download this infographic to:
Understand the...
The keys to the digital kingdom are too easy to steal through malware and social engineering. What can security leaders do to help raise their organizations' level of privileged access management? Ken Ammon of CA Technologies offers insights in this video interview.
Every financial institution is being challenged by its executives to move faster. With software applications at the forefront of innovation, IT organizations are under increasing pressure from lines of businesses to deliver applications faster while meeting internal IT directives to cut costs, protect customer...
From the moment the RSA Conference 2016 launched, speakers began debating the merits of the Apple/FBI case. Eminent cryptographers, NSA Director Mike Rogers and U.S. Attorney General Loretta E. Lynch all offered related opinions.
The impasse over whether Apple should help law enforcement open encrypted iPhones continued during a House hearing, as FBI Director James Comey and Apple's top lawyer, Bruce Sewell, didn't budge from their positions.
The world's economy is built on the flow, sharing, and processing of data. Before the Internet could power the global economy, trusting data to be authentic, private, and unaltered was both a core requirement and an insurmountable barrier. The solution was the use of cryptographic keys and digital certificates to...
A federal magistrate in Brooklyn, N.Y., unlike another judge in California, has denied a request by federal authorities to force Apple to retrieve data from an iPhone, this time in a New York narcotics case.
A new report from California's attorney general says failure to implement 20 critical security controls constitutes a lack of "reasonable security." So, could failure to adopt controls pose a legal threat to organizations? Perhaps, under certain circumstances.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.