As new payment options continue to emerge via mobile phones and internet of things devices, the PCI Security Standards Council is broadening its security efforts, starting with a new standard for contactless payments coming early next year, says Troy Leach, PCI SSC's chief technology officer.
Endpoint management, while broad from a technology standpoint, is moving in a definitive direction - the ability to centrally discover, provision, deploy, update, and troubleshoot endpoint devices within
an organization. The proliferation of laptops, desktops, and more will propel the worldwide market for
unified...
The workplace is transforming, and keeping up with evolving security threats has become more critical and challenging than ever. Malware
attacks come from all directions with an overwhelming majority of successful breaches beginning at the endpoint. This means that having a
comprehensive endpoint management solution...
The four-member Committee of Inquiry investigating the SingHealth data breach that affected 1.5 billion patients in Singapore heard testimony at a hearing that the healthcare organization's technology vendor failed to take prompt action on security alerts because a key cybersecurity employee was on leave.
It may seem silly to wonder how safe your backups are; backups are rarely
thought of as being at risk. It stems back to a time when backups were on
tape - a medium that would be tough for even skilled developers to hack. But
today's backups are stored (whether on-premises or in the cloud) on disk or,
more...
IoT devices are increasingly becoming a way to pay for goods and services, shifting the "internet of things" to the "internet of transactions." Gord Jamieson of Visa Canada discusses steps the card network is taking to ensure these payments are secure.
Security is a journey not a destination. What's been deployed today may be found
to have a vulnerability tomorrow. Operating systems like Windows Server 2003 and
2008, which were once trusted building blocks for critical applications, are now
potential liabilities as time goes on and maintenance comes to an end and...
It's time to proactively protect your company - and the place to start is your endpoints. Why? Because IDC research found that 70% of successful breaches begin at the endpoint. However, if you are taking a traditional approach to endpoint security, it may be causing you more problems than it solves.
Download this...
SMBs have historically struggled to adopt modern security products that work cohesively to support business operations with a comprehensive line of defense against sophisticated attacks.
Download this analyst report to learn how SMBs are utilizing endpoint security to:
Coordinate security across their...
The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face. Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them.
One mystery with the recently discovered payment card sniffing attacks against such organizations as British Airways and Newegg has been how attackers might have first gained access to the victims' networks. But a number of cybercrime markets sell such access, in some cases for as little as 50 cents.
Criminals operating online continue to target cryptocurrencies, leverage phishing and other social engineering attacks, as well as tweak age-old scams - including Nigerian prince emails - for the modern age. So warns Europol in its latest Internet Organized Crime Threat Assessment.
Hackers are constantly developing new exploits, and updating defenses is not an easy task. Dan Larson of Crowdstrike discusses some the new techniques hackers are using and how to fight them off.
Email security in the era of the cloud is a critical concern for business leaders. This tool is a powerful way for businesses and services to communicate with their customers. From transaction notifications to billing statements to social media updates, email is a proven reliable and effective way for businesses to...
Digital transformation has made it increasingly easy for consumers to switch institutions at the least provocation.
But leaders like Capital One, Guardian Life, and Goldman Sachs are embracing change and moving to the cloud. They're creating great customer experiences - and fighting churn - by integrating email into...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.