Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, VP Sales, with Easy Solutions.
Whether reports that the National Security Agency entered into a secret contract with security provider RSA are true or not - and RSA says they're not - the reputations of all American security vendors have been tarnished.
The breach of a card loyalty marketing company has reignited discussions about the roles banking institutions, regulators and others play when it comes to mitigating third-party risks. Where should the buck stop?
"We've made the investments in our shields, they must work" - this statement must have been decried by legions of ancient soldiers as this age-old defense decayed before their eyes and they were crushed on the battlefield. In fact, the graveyard is littered with 'proven' defense strategies which, given time, have...
Izz ad-Din al-Qassam Cyber Fighters' attacks on U.S. banks are back, and strikes waged July 31, without a doubt, prove it, says Akamai's Mike Smith. So why are security experts so puzzled by recent DDoS events?
Distributed-denial-of-service attacks are perfect weapons for cybercriminals and political adversaries, says Prolexic's Scott Hammack, who explains why any organization with an online presence should brace itself for attacks.
The implementation of IPv6, the new Internet communications protocol, will have a major impact on identity and access management. EMC researcher Davi Ottenheimer explains how organizations should prepare.