A staggering 1/3 of businesses have experienced lost or stolen staff mobile devices and, of those, 1/4 have lost data as a result.
With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints...
All organizations with an on-line presence need to quickly and efficiently detect hackers and fraudsters. However, to avoid frustrating the very people you want to feel welcome, it's critical that authentication processes be as simple as possible.
The newest generation of authentication technology utilizes shared...
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations today develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations today develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
The threat landscape has evolved, but security investments have largely remained the same. A disproportionate percentage of budgets are spent on prevention, yet targeted attacks
and advanced threats can easily evade these controls.
Read the Q&A transcript featuring Damballa CTO Brian Foster. Discussion topics...
Public Key Infrastructure (PKI) enables users to securely and privately exchange data shared through a trusted authority. Although it has been around for years, it has recently come back into the spotlight with Gartner's
research entitled "PKI's New Lease on Life in Mobility and the Internet of Things." The value of...
Global enterprises long ago discovered the business benefits of mobility, and now sophisticated criminals are moving into the space with a broad range of new threats. How prepared are you to defend your organization's data? Can the technology you deploy today evolve with the threats awaiting you tomorrow? Do you know...
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. But there is good...
The Target security breach and discovery of the "Heartbleed" vulnerability in web encryption software taught us some important lessons about enterprise security. Analyst Robin Layland applies those lessons to establish key requirements for next-generation firewalls (NGFW). Then HP's TJ Alldridge explains how HP...
Today's workforce is highly mobile. They don't just work on laptops, they also use smartphones, tablets and other devices, many of which they brought into the enterprise themselves. In addition, these workers don't stay put. While many work from the office, most access corporate networks and data from a variety of...
Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But while endpoint defenses are necessary, the headlines show they are not sufficient. Rather than relying on endpoint security alone, Gartner recommends businesses balance their investment across all four phases of...
Critical infrastructure industries vary in the sophistication of their digital defenses. But malware including Stuxnet and Flame, denial-of-service attacks on the financial industry, and other threats have made it clear that all sectors are targets.
This eBook looks at key dependencies among critical...
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. This e-book examines the security challenges unique to mid-size companies and the steps you should take to protect your business.
Download this eBook to learn:
Why...
In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt to find and hire the talent needed. The solution: grow your own.
This business white paper coaches IT leaders on...
Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning-24 percent of companies do not meet minimum...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.