When you are hacked, every second matters. It's critical to detect and stop the attack before serious damage is done to your business. HP TippingPoint Next-Generation Intrusion Prevention System (NGIPS) examines every packet of network traffic at wire speeds to detect and block attacks.
This (slightly...
The security industry has thousands of researchers looking for vulnerabilities in the software you use - HP Security Research alone has more than 3000. But how do you apply the security intelligence they develop to the job of protecting your network?
The Activate "Network Security Intelligence Selection Buying...
What will it take for the security leaders of 2020 to be the true guardians of their enterprises? Daniel Lohrmann shares insight in a keynote address from the Gulf Information Security conference in Dubai.
A class-action suit filed by U.S. banks and credit unions that's pending against Target could prove fruitful for the banks and credit unions, says attorney Chris Pierson, chief security officer at invoicing and payments provider Viewpost.
Miercom, a leading security testing firm, recently performed a head to head security efficacy analysis of network-based breach detection and Advanced Persistent Threat (APT) prevention solutions that utilize sandboxing. Zscaler Internet Security and FireEye Web MPS 1310 were tested, and Miercom found the Zscaler...
In conducting due diligence, investors spend more time than ever assessing the cyber-risk posed by the company targeted for acquisition, says Jacob Olcott, VP for business development at Bitsight Technologies.
Point-of-sale systems provider Harbortouch Payments has confirmed that it recently identified and contained a malware breach that affected "a small percentage" of the merchants that it serves.
Major data breaches affecting some of world's largest organizations have elevated cyber security to a top concern of executives and board directors. These data loss events can result in serious repercussions for businesses, including financial damage.
When it comes to significant breaches, BitSight botnet grades...
Mark Clancy, CEO of Soltra, which provides an automated information sharing platform, says banks and credit unions that don't share threat intelligence will never advance their information risk management practices.
Verizon is out with its annual Data Breach Investigations Report. Which breach and security trends are most relevant to India, and how do security leaders recommend that Indian organizations respond?
Are you heading to RSA Conference 2015 in San Francisco? If so, be sure to connect with Information Security Media Group. We'll be out in full force on the Expo floor, as well as running a number of must-attend sessions and events.
Collaboration is a critical investment for many organizations looking to drive competitive advantage by better arming knowledge workers with information, access to expertise, and the ability to act collectively on trusted content. Forrester data shows that over 50% of organizations have implemented or are expanding...
The dynamics of the world economy and the demands on governments at all levels put increasing pressure on organizations to reduce costs while seeking new opportunities to grow and differentiate their products and services. The pervasiveness of the Internet and mobile devices is fostering multi-channel customer...
The pursuit of creating competitive differentiation and accomplishing desired outcomes, such as adding incremental value to the business, is top of mind for most organizations-both for profit and non profit. Aberdeen surveyed 585 organizations across the world as part of its September 2013 Aberdeen Business Review...
Capture. This single word has gained much notoriety in recent years. The reason: the importance of capture to business processes. In particular, the notion of capturing - scanning - paper based information as early in a process as possible for a couple of reasons. The first reason is to eliminate the chance of the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.