Spear phishing attacks are increasingly sophisticated. Banking institutions must learn more about how fraudsters dupe one's customers and employees, says a panel of three financial fraud experts.
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.
The old, standard dashboards are no longer sufficient. To be truly effective, network pros now need new data to help find and resolve network security issues, says Mike Heumann of Emulex.
Organizations across all industry sectors understand the importance of information security. But turning security awareness into meaningful action - that's the challenge that many midsized entities face, says Sophos' Nick Bray.
Organizations and security threats have changed dramatically, but many information security strategies have not - and that is a huge problem, says SafeNet's Jason Hart.
An analysis of the Target breach prepared for a Senate committee is a political document that might help its patron's agenda but doesn't go far enough to identify technical solutions to help enterprises avoid Target-like breaches.
Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, VP Sales, with Easy Solutions.
Bankers and retailers are hotly debating who should be liable for losses and expenses associated with the breach at Target. See how our readers weighed in on the issues involved.
Leading this week's industry news roundup, FireEye Inc. announced the rollout of FireEye OS 7.1., an update to the FireEye OS. See additional news from Arbor Networks, HID Global and more.
Whether reports that the National Security Agency entered into a secret contract with security provider RSA are true or not - and RSA says they're not - the reputations of all American security vendors have been tarnished.
The breach of a card loyalty marketing company has reignited discussions about the roles banking institutions, regulators and others play when it comes to mitigating third-party risks. Where should the buck stop?
"We've made the investments in our shields, they must work" - this statement must have been decried by legions of ancient soldiers as this age-old defense decayed before their eyes and they were crushed on the battlefield. In fact, the graveyard is littered with 'proven' defense strategies which, given time, have...
Can roaming services be used successfully as a backup for mobile networks that fail? It's a new idea being explored by the European Network and Information Security Agency. What are the pros and cons?
It's been three weeks since the start of Phase 4 DDoS attacks on banks. But so far the impact has been minor. Are attacks over or yet to come? Rodney Joffe and other DDoS experts share theories.
DDoS attacks launched by hacktivists are often viewed as little more than an interruption to online services. But Terry Ray of Imperva highlights a greater worry hidden behind these attacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.