Fraudsters continue to make inroads against financial institutions based in the United Kingdom - and beyond - because banks aren't working together to share information about the attacks they see, according to presenters at the London Fraud Summit.
FS-ISAC has teamed up with the Depository Trust and Clearing Corp. to offer software designed to ease cyberthreat information collection and sharing, helping safeguard against cyber-attacks.
Security firms McAfee and Symantec have joined the Cyber Threat Alliance, which was launched by Fortinet and Palo Alto Networks in May as a way to share threat intelligence.
The 9/11 Commission, in its 10th anniversary report, cautions Americans and the U.S. government to treat cyberthreats more seriously than they did terrorist threats in the days and weeks before Sept. 11, 2001.
Attacks are more frequent, severe and complex. How can security pros defend against the entire attack continuum - before, during and after? Cisco's Bret Hartman describes a threat-centric approach.
When is it time to make that big move to a new job? And what's the smartest strategy? Matthew Speare of Regions, a bank holding company, talks about how to read and respond to signs that it's time for a major career change.
The use of smartphones, tablets, and other mobile devices to conduct online transactions has rapidly grown into a standard practice. A large percentage of these now-common mobile transactions are completed using mobile apps. Unfortunately, crime associated with their use has increased correspondingly, resulting in a...
"United we stand; divided we fall." That's the message from Art Coviello to kick off the 2014 RSA Conference Asia Pacific & Japan in Singapore. What advice does the RSA chair offer to global security leaders?
Characterizing the state of employment among American information security practitioners, executive recruiter Joyce Brocaglia says, "We are experiencing negative unemployment in the field of information security."
Since the beginning of web application delivery, there has been an opportunity for fraudsters to get into the middle of a transaction and impersonate the legitimate user. Since the credentials used for this fraud are valid and "expected to be under the control of the real user," this type of impersonation has been...
Users spend, on average, 82% of their mobile minutes with apps and just 18% with web browsers. It's the lean, restricted functionality of mobile apps that makes them both convenient and task-oriented - and a major reason why they're so attractive to consumers and businesses. But mobile app development and the...
The trends impacting business today-cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing- make the need for strong authentication more important than ever.
The IT department can no longer firmly establish a network perimeter and rely on simple username and...
IT and the business are being impacted by many important trends-cloud adoption, increased mobility, the rise of social media, and the increasing flow of information across the extended enterprise. The old network perimeter is no longer relevant. Today's IT must deal with highly distributed identities across the...
"Trust" does not mean giving employees unrestricted and unnecessary access to information. With the right security controls, organizations can significantly reduce their exposure to the risk of insider threats. The key is to find the right balance between employee enablement and control, while holding employees...
The traditional dangers IT security teams have been facing and overcoming for years are being replaced by a far more hazardous, insidious form of attack: the Advanced Persistent Threat (APT).
Although APTs are an emerging threat vector, their impact has already been felt in substantial ways.
This white paper...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.