The prevalent approach to security management and operations is to implement on an ad hoc and technology-focused basis. This haphazard approach is no longer adequate.
This report details:
The current state of the market and what to expect moving forward;
Research implications for technology vendors;
Research...
As part of the software development process, security professionals must make choices about where to invest their budget and staff resources to ensure that homegrown applications are as secure as possible.
This research brief details:
Best practices for all organizations that would like to produce more secure...
The fact is that the world is constantly evolving and always connected - and your enterprise must be too. Forward-thinking enterprises realize that they need to focus on a sustainable approach to security and risk management - one that is designed to address the new wave of vulnerabilities that prevail due to...
DDoS attacks on banks are becoming more rampant, advanced and persistent. Attackers are continuing to work around the clock in developing and sharpening their toolset and methodologies used to perform these attacks.
Most attacks have been brute-force against multiple institutions; others have been subtle, probing...
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat (APT), cybersecurity incidents have evolved at a rapid pace and are disrupting business continuity. But are organizations' incident response programs, personnel and tools evolving to keep up with the new threat...
To mitigate the top threats for 2013, organizations need to understand the motivations of potential attackers so they can adequately defend their networks and systems.
What are the top security threats, and how are organizations responding to them?
"Reassessing Risk" is the cover story of this 2013 edition of...
The 2013 Mobile Security Strategies survey is now closed for participation. Results will be available in the coming weeks, providing practical insights on emerging security trends and investments.
Stay tuned for analysis of how organizations will address the top mobile security challenges of 2013, with emphasis...
What are organizations' top cloud security concerns, and how are security leaders addressing these concerns through policy, technology and improved vendor management?
These are key questions posed by the 2012 Cloud Computing Security Survey, which was crafted with assistance from leading experts in cloud...
U.S. banking institutions have money to spend, but do they know where best to invest it? That's the question begged by the results of the 2012 Faces of Fraud Survey.
Following a year of high-profile fraud incidents, anti-fraud budgets have been fattened. Asked how their fraud resources will change in the coming...
Malware and Trojans are now spreading faster than ever, with Zeus deployed on millions of PCs and mobile devices capable of man-in-the-browser attacks. Learn to stop cybercriminals and their malware, before they can do damage, while letting your good customers breeze on through.
Aite Group, an independent...
Name.com used to block IP addresses to stop scammers, but discovered that many figured out how to get around it. They started using next generation device identification, which goes beyond browser fingerprinting to identify the device, bypass proxies and detect the use of botnets, resulting in fewer chargebacks, lower...
The cybersecurity war is fought on the new frontier of unregulated and insufficiently protected computers belonging to customers, contractors, business partners and the web applications with which they transact, login, consume and share. As cybercrime exploits become more sophisticated, defending against them requires...
In this whitepaper you will get an overview of Access Governance, introducing the concept, the business drivers, and the associated challenges. The paper explains a four-phase approach to achieving Access Governance and explores the capabilities that are required in each phase.
Topics covered in the whitepaper...
Organizations of all sizes continue to face ever-stricter regulatory and security requirements to protect their IT assets from unauthorized use. In response, many enterprises have embarked upon Identity and Access Management (IAM) initiatives, only to be disappointed with the cost, speed and effectiveness of their...
Many organizations are still using personal information, such as mother's maiden name and date of birth, to verify user identities. However, personal data is everywhere - in search engines and on social networking and other third-party sites - making the use of these static data elements a less secure measure for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.