Outsourcing to the cloud poses new risks, especially for card data. The PCI Council addresses those risks in its just-released cloud security guidance, and Bob Russo offers exclusive insights.
As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
In the last few months, major U.S. banking institutions have been victims of a powerful wave of distributed-denial-of-service attacks that combine three different attack tools. These "Triple Crown" attacks take DDoS to a whole new level. How can institutions improve their defenses?
Join this session for expert...
IBM's Dan Hauenstein, in analyzing Big Blue's 2012 Tech Trends Report, says security concerns often inhibit the adoption of four technologies: mobile, cloud, social business media and business analytics.
Mobile malware and cloud-based botnets will be top cyberthreats for 2013, says Georgia Tech's Paul Royal. How should organizations address these and other upcoming threats in the New Year?
Cloud-based botnets and mobile malware are two of 2013's top cyberthreats. What other threats make the list? Georgia Tech's Paul Royal tells how security pros and organizations can prepare.
The kind of detailed data analysis that helped statistician Nate Silver predict accurately the outcome of the U.S. presidential election could help enterprises using cloud-based SIEM to identify vulnerabilities, says Cloud Security Alliance's Jens Laundrup.
Mobility continues to change the landscape for security professionals concerned with data loss and the growing number of endpoints, says CTO Dan Hubbard, who offers mitigation strategies.
Budgets are a big issue today for those managing their risk management frameworks, says NIST's Ron Ross, who offers his advice on using cloud as a means to save money and improve IT infrastructure.
The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.
Cloud computing and mobile technologies add new complexities to how we approach identity and access management. RSA CTO Sam Curry offers advice on overcoming the challenges.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
What are organizations' top cloud security concerns, and how are security leaders addressing these concerns through policy, technology and improved vendor management?
These are key questions posed by the 2012 Cloud Computing Security Survey, which was crafted with assistance from leading experts in cloud...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.